Severity
7.5HIGH
EPSS
2.2%
top 15.44%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 13
Latest updateJul 22

Description

Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages5 packages

NVDredislabs/redis2.8.02.8.24+2
Debianredis< 2:3.0.5-4+3
NVDredhat/openstack6.0, 7.0+1
NVDopensuse/leap42.1

Also affects: Debian Linux 8.0, 9.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-4r9x-2fwv-q8g6: Integer overflow in the getnum function in lua_struct2022-05-14
OSV
CVE-2015-8080: Integer overflow in the getnum function in lua_struct2016-04-13
CVEList
CVE-2015-8080: Integer overflow in the getnum function in lua_struct2016-04-13

💥Exploits & PoCs

4
Exploit-DB
Microsoft Edge Windows 10 Version 1511 - Cross Site Scripting (XSS)2025-07-22
Exploit-DB
Infinite Automation Mango Automation - Command Injection (Metasploit)2017-09-13
Exploit-DB
Cherry Music 0.35.1 - Arbitrary File Disclosure2016-09-13
Exploit-DB
Samsung - libQjpeg Image Decoding Memory Corruption2015-11-03

📋Vendor Advisories

4
Red Hat
redis: integer overflow in the getnum function in lua_struct.c could lead to a DoS2020-06-15
Microsoft
An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (mem2020-06-09
Red Hat
redis: Integer wraparound in lua_struct.c causing stack-based buffer overflow2015-11-06
Debian
CVE-2015-8080: redis - Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2....2015

💬Community

4
Bugzilla
CVE-2020-14147 redis: integer overflow in the getnum function in lua_struct.c could lead to a DoS2020-06-18
Bugzilla
CVE-2015-8080 redis: Integer wraparound in lua_struct.c causing stack-based buffer overflow [epel-all]2015-11-06
Bugzilla
CVE-2015-8080 redis: Integer wraparound in lua_struct.c causing stack-based buffer overflow2015-11-06
Bugzilla
CVE-2015-8080 redis: Integer wraparound in lua_struct.c causing stack-based buffer overflow [fedora-all]2015-11-06
CVE-2015-8080 (HIGH CVSS 7.5) | Integer overflow in the getnum func | cvebase.io