CVE-2020-14147
Severity CVSS v4.0:
Pending analysis
Type:
CWE-190
Integer Overflow or Wraparound
Publication date:
15/06/2020
Last modified:
30/07/2021
Description
An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.
Impact
Base Score 3.x
7.70
Severity 3.x
HIGH
Base Score 2.0
4.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:redislabs:redis:*:*:*:*:*:*:*:* | 5.0.9 (excluding) | |
| cpe:2.3:a:redislabs:redis:*:*:*:*:*:*:*:* | 6.0.0 (including) | 6.0.3 (excluding) |
| cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:communications_operations_monitor:4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:communications_operations_monitor:4.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html
- https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571
- https://github.com/antirez/redis/pull/6875
- https://security.gentoo.org/glsa/202008-17
- https://www.debian.org/security/2020/dsa-4731
- https://www.oracle.com/security-alerts/cpujan2021.html



