FreeBSD : redis -- EVAL Lua Sandbox Escape (838fa84a-0e25-11e5-90e4-d050996490d0)

This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Ben Murphy reports :

It is possible to break out of the Lua sandbox in Redis and execute
arbitrary code.

This shouldn't pose a threat to users under the trusted Redis
security model where only trusted users can connect to the database.
However, in real deployments there could be databases that can be
accessed by untrusted users. The main deployments that are vulnerable
are developers machines, places where redis servers can be reached via
SSRF attacks and cloud hosting.

See also :

http://www.nessus.org/u?d07c07d6
http://www.nessus.org/u?0c31c132

Solution :

Update the affected packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 84043 ()

Bugtraq ID:

CVE ID: CVE-2015-4335

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now