CVE-2020-14147

high

Description

An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.

References

https://www.tenable.com/blog/oracle-january-2021-critical-patch-update-five-critical-weblogic-flaws-cve-2021-2109

https://www.oracle.com/security-alerts/cpujan2021.html

https://www.debian.org/security/2020/dsa-4731

https://security.gentoo.org/glsa/202008-17

https://github.com/antirez/redis/pull/6875

https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571

http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html

Details

Source: Mitre, NVD

Published: 2020-06-15

Updated: 2021-07-30

Risk Information

CVSS v2

Base Score: 4

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P

Severity: Medium

CVSS v3

Base Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

Severity: High