CVE-2015-8080
Severity
7.5HIGH
EPSS
2.2%
top 15.44%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedApr 13
Latest updateJul 22
Description
Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6
Affected Packages5 packages
Also affects: Debian Linux 8.0, 9.0
Patches
🔴Vulnerability Details
3💥Exploits & PoCs
4📋Vendor Advisories
4Red Hat
▶
Microsoft▶
An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (mem↗2020-06-09
Debian▶
CVE-2015-8080: redis - Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2....↗2015
💬Community
4Bugzilla▶
CVE-2020-14147 redis: integer overflow in the getnum function in lua_struct.c could lead to a DoS↗2020-06-18
Bugzilla▶
CVE-2015-8080 redis: Integer wraparound in lua_struct.c causing stack-based buffer overflow [epel-all]↗2015-11-06
Bugzilla▶
CVE-2015-8080 redis: Integer wraparound in lua_struct.c causing stack-based buffer overflow↗2015-11-06
Bugzilla▶
CVE-2015-8080 redis: Integer wraparound in lua_struct.c causing stack-based buffer overflow [fedora-all]↗2015-11-06