CVE-2015-8080

Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 83%
VendorProductVersion
redislabsredis
2.8.0 ≤
𝑥
< 2.8.24
redislabsredis
3.0.0 ≤
𝑥
< 3.0.6
redislabsredis
5.0.0 ≤
𝑥
< 5.0.8
debiandebian_linux
8.0
debiandebian_linux
9.0
opensuseleap
42.1
opensuseopensuse
13.2
redhatopenstack
6.0
redhatopenstack
7.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
redis
bullseye
5:6.0.16-1+deb11u2
fixed
wheezy
not-affected
squeeze
not-affected
bullseye (security)
5:6.0.16-1+deb11u3
fixed
bookworm
5:7.0.15-1~deb12u1
fixed
bookworm (security)
5:7.0.15-1~deb12u1
fixed
sid
5:7.0.15-2
fixed
trixie
5:7.0.15-2
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
redis
bionic
not-affected
artful
ignored
zesty
ignored
yakkety
ignored
xenial
not-affected
wily
ignored
vivid
ignored
trusty
Fixed 2:2.8.4-2ubuntu0.2
released
precise
ignored