CVE-2020-14147
15.06.2020, 18:15
An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.Enginsight
Vendor | Product | Version |
---|---|---|
redislabs | redis | 𝑥 < 5.0.9 |
redislabs | redis | 6.0.0 ≤ 𝑥 < 6.0.3 |
oracle | communications_operations_monitor | 3.4 |
oracle | communications_operations_monitor | 4.1 |
oracle | communications_operations_monitor | 4.2 |
oracle | communications_operations_monitor | 4.3 |
suse | linux_enterprise | 12.0 |
debian | debian_linux | 10.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
References