CVE-2016-8339
Severity CVSS v4.0:
Pending analysis
Type:
CWE-787
Out-of-bounds Write
Publication date:
28/10/2016
Last modified:
12/04/2025
Description
A buffer overflow in Redis 3.2.x prior to 3.2.4 causes arbitrary code execution when a crafted command is sent. An out of bounds write vulnerability exists in the handling of the client-output-buffer-limit option during the CONFIG SET command for the Redis data structure store. A crafted CONFIG SET command can lead to an out of bounds write potentially resulting in code execution.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:redislabs:redis:3.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redislabs:redis:3.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redislabs:redis:3.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:redislabs:redis:3.2.3:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.securityfocus.com/bid/93283
- http://www.talosintelligence.com/reports/TALOS-2016-0206/
- https://github.com/antirez/redis/commit/6d9f8e2462fc2c426d48c941edeb78e5df7d2977
- https://security.gentoo.org/glsa/201702-16
- http://www.securityfocus.com/bid/93283
- http://www.talosintelligence.com/reports/TALOS-2016-0206/
- https://github.com/antirez/redis/commit/6d9f8e2462fc2c426d48c941edeb78e5df7d2977
- https://security.gentoo.org/glsa/201702-16



