[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2015-8080Date: (C)2016-04-28   (M)2023-12-22


Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 7.5CVSS Score : 5.0
Exploit Score: 3.9Exploit Score: 10.0
Impact Score: 3.6Impact Score: 2.9
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector: NETWORK
Attack Complexity: LOWAccess Complexity: LOW
Privileges Required: NONEAuthentication: NONE
User Interaction: NONEConfidentiality: NONE
Scope: UNCHANGEDIntegrity: NONE
Confidentiality: NONEAvailability: PARTIAL
Integrity: NONE 
Availability: HIGH 
  
Reference:
BID-77507
DSA-3412
GLSA-201702-16
RHSA-2016:0095
RHSA-2016:0096
RHSA-2016:0097
http://www.openwall.com/lists/oss-security/2015/11/06/4
http://www.openwall.com/lists/oss-security/2015/11/06/2
https://github.com/antirez/redis/issues/2855
https://raw.githubusercontent.com/antirez/redis/2.8/00-RELEASENOTES
https://raw.githubusercontent.com/antirez/redis/3.0/00-RELEASENOTES
openSUSE-SU-2016:1444

CPE    3
cpe:/o:debian:debian_linux:9.0
cpe:/a:redhat:openstack:7.0
cpe:/o:debian:debian_linux:8.0
CWE    1
CWE-190
OVAL    1
oval:org.secpod.oval:def:1801826

© SecPod Technologies