CVE-2015-8080 vulnerability in Redis Labs and Other Products
Published on April 13, 2016
Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow.
Products Associated with CVE-2015-8080
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2015-8080 are published in these products:
Exploit Probability
EPSS
2.24%
Percentile
84.30%
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.