First published: Wed Apr 13 2016(Updated: )
Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Redis | >=2.8.0<2.8.24 | |
Redis | >=3.0.0<3.0.6 | |
Redis | >=5.0.0<5.0.8 | |
Debian Linux | =8.0 | |
Debian Linux | =9.0 | |
SUSE Linux | =42.1 | |
openSUSE | =13.2 | |
Red Hat OpenStack for IBM Power | =6.0 | |
Red Hat OpenStack for IBM Power | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8080 has a high severity due to its potential for denial of service and memory corruption.
To fix CVE-2015-8080, upgrade Redis to version 2.8.24 or 3.0.6 or later.
CVE-2015-8080 affects Redis versions before 2.8.24 and 3.0.6.
Yes, CVE-2015-8080 may potentially allow attackers to bypass the intended Redis sandbox.
CVE-2015-8080 can lead to application crashes and possible exploitation of systems running vulnerable Redis versions.