[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2015-4335Date: (C)2015-06-12   (M)2023-12-22


Redis before 2.8.21 and 3.x before 3.0.2 allows remote attackers to execute arbitrary Lua bytecode via the eval command.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 10.0
Exploit Score: 10.0
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
BID-75034
DSA-3279
FEDORA-2015-9488
FEDORA-2015-9498
GLSA-201702-16
RHSA-2015:1676
http://www.openwall.com/lists/oss-security/2015/06/04/8
http://www.openwall.com/lists/oss-security/2015/06/04/12
http://www.openwall.com/lists/oss-security/2015/06/05/3
http://benmmurphy.github.io/blog/2015/06/04/redis-eval-lua-sandbox-escape/
https://github.com/antirez/redis/commit/fdf9d455098f54f7666c702ae464e6ea21e25411
https://groups.google.com/forum/#%21msg/redis-db/4Y6OqK8gEyk/Dg-5cejl-eUJ
openSUSE-SU-2015:1687

CPE    2
cpe:/o:debian:debian_linux:9.0
cpe:/o:debian:debian_linux:8.0
CWE    1
CWE-17
OVAL    3
oval:org.secpod.oval:def:109335
oval:org.secpod.oval:def:602133
oval:org.secpod.oval:def:109321

© SecPod Technologies