Short Name |
APP:REDIS-GETNUM-IO |
---|---|
Severity |
Major |
Recommended |
Yes |
Recommended Action |
Drop |
Category |
APP |
Keywords |
Redis Lua Scripting Component getnum Integer Overflow |
Release Date |
2016/01/07 |
Update Number |
2610 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability in the Redis Lua Scripting component. This vulnerability is due to the vulnerable server incorrectly parsing specific Lua scripts. A successful attack can lead to an Integer overflow and cause denial of service to the running application.
Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow.