DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References

No reference.

History

Mon, 04 Nov 2024 07:00:00 +0000

Type Values Removed Values Added
Description Redis 2.60 through 7.41 allows a denial of service (memory consumption) when authentication is enabled because "client-output-buffer-limit normal" has no limit, and an attacker can send requests without a password (which results in a "NOAUTH Authentication required" response). NOTE: this is disputed by third parties because Redis is not intended for use with untrusted clients. DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
References

Mon, 04 Nov 2024 06:45:00 +0000

Type Values Removed Values Added
Description Redis 2.60 through 7.41 allows a denial of service (memory consumption) when authentication is enabled because "client-output-buffer-limit normal" has no limit, and an attacker can send requests without a password (which results in a "NOAUTH Authentication required" response). NOTE: this is disputed by third parties because Redis is not intended for use with untrusted clients.
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: REJECTED

Assigner: mitre

Published:

Updated: 2024-11-04T06:48:44.428879

Reserved: 2024-10-08T00:00:00

Link: CVE-2024-48342

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Rejected

Published: 2024-11-04T07:15:11.437

Modified: 2024-11-04T07:15:11.437

Link: CVE-2024-48342

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses

No weakness.