Redis through 8.0.3 allows memory consumption via a multi-bulk command composed of many bulks, sent by an authenticated user. This occurs because the server allocates memory for the command arguments of every bulk, even when the command is skipped because of insufficient permissions. NOTE: this is disputed by the Supplier because abuse of the commands network protocol is not a violation of the Redis Security Model.
References
Configurations
No configuration.
History
26 Aug 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
CWE | ||
Summary |
|
25 Jul 2025, 04:16
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) Redis through 8.0.3 allows memory consumption via a multi-bulk command composed of many bulks, sent by an authenticated user. This occurs because the server allocates memory for the command arguments of every bulk, even when the command is skipped because of insufficient permissions. NOTE: this is disputed by the Supplier because abuse of the commands network protocol is not a violation of the Redis Security Model. | |
References |
|
|
CWE | CWE-401 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 3.5 |
23 Jul 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.9 |
CWE | CWE-789 |
23 Jul 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-23 19:15
Updated : 2025-08-26 19:15
NVD link : CVE-2025-46686
Mitre link : CVE-2025-46686
CVE.ORG link : CVE-2025-46686
JSON object : View
Products Affected
No product.
CWE
CWE-401
Missing Release of Memory after Effective Lifetime