Логотип exploitDog
bind:"BDU:2021-00559" OR bind:"CVE-2020-14147"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2021-00559" OR bind:"CVE-2020-14147"

Количество 8

Количество 8

fstec логотип

BDU:2021-00559

больше 5 лет назад

Уязвимость реализации функции getnum() резидентной системы управления базами данных класса NoSQL Redis, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код

CVSS3: 7.7
EPSS: Низкий
ubuntu логотип

CVE-2020-14147

больше 5 лет назад

An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.

CVSS3: 7.7
EPSS: Низкий
redhat логотип

CVE-2020-14147

больше 5 лет назад

An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.

CVSS3: 7.7
EPSS: Низкий
nvd логотип

CVE-2020-14147

больше 5 лет назад

An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.

CVSS3: 7.7
EPSS: Низкий
msrc логотип

CVE-2020-14147

больше 5 лет назад

An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.

CVSS3: 7.7
EPSS: Низкий
debian логотип

CVE-2020-14147

больше 5 лет назад

An integer overflow in the getnum function in lua_struct.c in Redis be ...

CVSS3: 7.7
EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:1035-1

больше 5 лет назад

Security update for redis

EPSS: Низкий
github логотип

GHSA-5q54-rrmc-9jrp

больше 3 лет назад

An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2021-00559

Уязвимость реализации функции getnum() резидентной системы управления базами данных класса NoSQL Redis, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код

CVSS3: 7.7
0%
Низкий
больше 5 лет назад
ubuntu логотип
CVE-2020-14147

An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.

CVSS3: 7.7
0%
Низкий
больше 5 лет назад
redhat логотип
CVE-2020-14147

An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.

CVSS3: 7.7
0%
Низкий
больше 5 лет назад
nvd логотип
CVE-2020-14147

An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.

CVSS3: 7.7
0%
Низкий
больше 5 лет назад
msrc логотип
CVE-2020-14147

An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.

CVSS3: 7.7
0%
Низкий
больше 5 лет назад
debian логотип
CVE-2020-14147

An integer overflow in the getnum function in lua_struct.c in Redis be ...

CVSS3: 7.7
0%
Низкий
больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:1035-1

Security update for redis

0%
Низкий
больше 5 лет назад
github логотип
GHSA-5q54-rrmc-9jrp

An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу