CVE-2015-8080
redis: Integer wraparound in lua_struct.c causing stack-based buffer overflow
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow.
Desbordamiento de entero en la función getnum en lua_struct.c en Redis 2.8.x en versiones anteriores a 2.8.24 y 3.0.x en versiones anteriores a 3.0.6 permite a atacantes dependientes de contexto con permiso para ejecutar código Lua en una sesión Redis provocar una denegación de servicio (corrupción de memoria y caída de la aplicación) o posiblemente eludir restricciones destinadas a la sandbox a través de un número grande, lo que desencadena un desbordamiento de buffer basado en pila.
An integer-wraparound flaw leading to a stack-based overflow was found in Redis. A user with access to run Lua code in a Redis session could possibly use this flaw to crash the server (denial of service) or gain code execution outside of the Lua sandbox.
Redis is an advanced key-value store. It is often referred to as a data structure server because keys can contain strings, hashes, lists, sets, or sorted sets. An integer-wraparound flaw leading to a stack-based overflow was found in Redis. A user with access to run Lua code in a Redis session could possibly use this flaw to crash the server or gain code execution outside of the Lua sandbox. All users of redis are advised to upgrade to these updated packages, which correct this issue.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-11-06 CVE Reserved
- 2015-12-04 CVE Published
- 2024-08-06 CVE Updated
- 2024-08-06 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-190: Integer Overflow or Wraparound
CAPEC
References (14)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2015/11/06/2 | Mailing List |
|
http://www.openwall.com/lists/oss-security/2015/11/06/4 | Mailing List |
|
http://www.securityfocus.com/bid/77507 | Third Party Advisory | |
https://raw.githubusercontent.com/antirez/redis/2.8/00-RELEASENOTES | Release Notes | |
https://raw.githubusercontent.com/antirez/redis/3.0/00-RELEASENOTES | Release Notes |
URL | Date | SRC |
---|---|---|
https://github.com/antirez/redis/issues/2855 | 2024-08-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2016-05/msg00126.html | 2022-08-05 | |
http://rhn.redhat.com/errata/RHSA-2016-0095.html | 2022-08-05 | |
http://rhn.redhat.com/errata/RHSA-2016-0096.html | 2022-08-05 | |
http://rhn.redhat.com/errata/RHSA-2016-0097.html | 2022-08-05 | |
http://www.debian.org/security/2015/dsa-3412 | 2022-08-05 | |
https://security.gentoo.org/glsa/201702-16 | 2022-08-05 | |
https://access.redhat.com/security/cve/CVE-2015-8080 | 2016-02-01 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1278965 | 2016-02-01 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Redislabs Search vendor "Redislabs" | Redis Search vendor "Redislabs" for product "Redis" | >= 2.8.0 < 2.8.24 Search vendor "Redislabs" for product "Redis" and version " >= 2.8.0 < 2.8.24" | - |
Affected
| ||||||
Redislabs Search vendor "Redislabs" | Redis Search vendor "Redislabs" for product "Redis" | >= 3.0.0 < 3.0.6 Search vendor "Redislabs" for product "Redis" and version " >= 3.0.0 < 3.0.6" | - |
Affected
| ||||||
Redislabs Search vendor "Redislabs" | Redis Search vendor "Redislabs" for product "Redis" | >= 5.0.0 < 5.0.8 Search vendor "Redislabs" for product "Redis" and version " >= 5.0.0 < 5.0.8" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Leap Search vendor "Opensuse" for product "Leap" | 42.1 Search vendor "Opensuse" for product "Leap" and version "42.1" | - |
Affected
| ||||||
Opensuse Search vendor "Opensuse" | Opensuse Search vendor "Opensuse" for product "Opensuse" | 13.2 Search vendor "Opensuse" for product "Opensuse" and version "13.2" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Openstack Search vendor "Redhat" for product "Openstack" | 6.0 Search vendor "Redhat" for product "Openstack" and version "6.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Openstack Search vendor "Redhat" for product "Openstack" | 7.0 Search vendor "Redhat" for product "Openstack" and version "7.0" | - |
Affected
|