Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-14147

Опубликовано: 15 июн. 2020
Источник: ubuntu
Приоритет: medium
CVSS2: 4
CVSS3: 7.7

Описание

An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.

РелизСтатусПримечание
bionic

not-affected

code not present
devel

not-affected

5:6.0.0-1
eoan

ignored

end of life
esm-apps/bionic

not-affected

code not present
esm-apps/focal

needed

esm-apps/jammy

not-affected

5:6.0.0-1
esm-apps/noble

not-affected

5:6.0.0-1
esm-apps/xenial

not-affected

code not present
esm-infra-legacy/trusty

not-affected

code not present
focal

ignored

end of standard support, was needed

Показывать по

4 Medium

CVSS2

7.7 High

CVSS3

Связанные уязвимости

CVSS3: 7.7
redhat
больше 5 лет назад

An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.

CVSS3: 7.7
nvd
больше 5 лет назад

An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.

CVSS3: 7.7
msrc
больше 5 лет назад

An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.

CVSS3: 7.7
debian
больше 5 лет назад

An integer overflow in the getnum function in lua_struct.c in Redis be ...

suse-cvrf
больше 5 лет назад

Security update for redis

4 Medium

CVSS2

7.7 High

CVSS3