Vulnerability Name: | CVE-2015-8080 (CCN-107887) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2015-11-06 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Published: | 2015-11-06 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2022-08-05 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Summary: | Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-190 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2015-8080 Source: SUSE Type: Mailing List, Third Party Advisory openSUSE-SU-2016:1444 Source: CCN Type: RHSA-2016-0095 Moderate: redis security advisory Source: REDHAT Type: Third Party Advisory RHSA-2016:0095 Source: CCN Type: RHSA-2016-0096 Moderate: redis security advisory Source: REDHAT Type: Third Party Advisory RHSA-2016:0096 Source: CCN Type: RHSA-2016-0097 Moderate: redis security advisory Source: REDHAT Type: Third Party Advisory RHSA-2016:0097 Source: CCN Type: oss-sec Mailing List, Fri, 06 Nov 2015 10:37:19 +0100 Review+CVE request: multiple issues in redis EVAL command (lua sandbox) Source: CCN Type: oss-sec Mailing List, Fri, 6 Nov 2015 12:07:30 -0500 (EST) Re: Review+CVE request: multiple issues in redis EVAL command (lua sandbox) Source: DEBIAN Type: Third Party Advisory DSA-3412 Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20151106 Review+CVE request: multiple issues in redis EVAL command (lua sandbox) Source: MLIST Type: Mailing List, Third Party Advisory [oss-security] 20151106 Re: Review+CVE request: multiple issues in redis EVAL command (lua sandbox) Source: BID Type: Third Party Advisory, VDB Entry 77507 Source: CCN Type: BID-77507 Antirez Redis 'lua_struct.c' Integer Overflow Vulnerability Source: XF Type: UNKNOWN redis-cve20158080-dos(107887) Source: CCN Type: Redis GIT Repository Integer overflow (leading to stack-based buffer overflow) in embedded lua_struct.c #2855 Source: MISC Type: Exploit, Issue Tracking, Patch, Third Party Advisory https://github.com/antirez/redis/issues/2855 Source: CONFIRM Type: Release Notes, Third Party Advisory https://raw.githubusercontent.com/antirez/redis/2.8/00-RELEASENOTES Source: CONFIRM Type: Release Notes, Third Party Advisory https://raw.githubusercontent.com/antirez/redis/3.0/00-RELEASENOTES Source: GENTOO Type: Third Party Advisory GLSA-201702-16 | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
BACK |