CVE-2015-8080 PUBLISHED

Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow.

EPSS 2.24% · 84.4th percentile

Risk Scores

EPSS Score
2.24%
84.4th percentile

Affected Products

VendorProductVersions
Ubuntu:14.04:LTSredis0, 2:2.6.13-1, 2:2.6.16-3

Timeline

References

Open in Interactive Console →