CVE-2016-8339
Severity
9.8CRITICAL
EPSS
2.5%
top 14.69%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 28
Latest updateMay 13
Description
A buffer overflow in Redis 3.2.x prior to 3.2.4 causes arbitrary code execution when a crafted command is sent. An out of bounds write vulnerability exists in the handling of the client-output-buffer-limit option during the CONFIG SET command for the Redis data structure store. A crafted CONFIG SET command can lead to an out of bounds write potentially resulting in code execution.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9
Affected Packages3 packages
Patches
🔴Vulnerability Details
3📋Vendor Advisories
2🕵️Threat Intelligence
1Talos▶
Vulnerability Spotlight: Redis CONFIG SET client-output-buffer-limit Code Execution Vulnerability↗2016-09-30
💬Community
1Bugzilla▶
CVE-2016-8339 redis: OOB write vulnerability in handling of client-output-buffer-limit option during the CONFIG SET command↗2016-10-03