Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

APP:REDIS-GETNUM-IO

Severity

Major

Recommended

Yes

Recommended Action

Drop

Category

APP

Keywords

Redis Lua Scripting Component getnum Integer Overflow

Release Date

2016/01/07

Update Number

2610

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

APP: Redis Lua Scripting Component getnum Integer Overflow


This signature detects attempts to exploit a known vulnerability in the Redis Lua Scripting component. This vulnerability is due to the vulnerable server incorrectly parsing specific Lua scripts. A successful attack can lead to an Integer overflow and cause denial of service to the running application.

Extended Description

Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow.

Affected Products

  • Debian debian_linux 8.0
  • Debian debian_linux 9.0
  • Redislabs redis 2.8.23
  • Redislabs redis 3.0.0
  • Redislabs redis 3.0.1
  • Redislabs redis 3.0.2
  • Redislabs redis 3.0.3
  • Redislabs redis 3.0.4
  • Redislabs redis 3.0.5

References

  • CVE: CVE-2015-8080

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out