redislabs redis CVE-2015-8080 vulnerability in Redis Labs and Other Products
Published on April 13, 2016

product logo product logo product logo product logo
Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow.

Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory NVD


Products Associated with CVE-2015-8080

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2015-8080 are published in these products:

 
 
 
 
 

Exploit Probability

EPSS
2.24%
Percentile
84.30%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.