Redis before 2.8.21 and 3.x before 3.0.2 allows remote attackers to execute arbitrary Lua bytecode via the eval command.
References
Configurations
History
21 Nov 2024, 02:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://benmmurphy.github.io/blog/2015/06/04/redis-eval-lua-sandbox-escape/ - Exploit, Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162094.html - Third Party Advisory | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162146.html - Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-updates/2015-10/msg00014.html - Third Party Advisory | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1676.html - Third Party Advisory | |
References | () http://www.debian.org/security/2015/dsa-3279 - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2015/06/04/12 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2015/06/04/8 - Mailing List, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2015/06/05/3 - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/75034 - Third Party Advisory, VDB Entry | |
References | () https://github.com/antirez/redis/commit/fdf9d455098f54f7666c702ae464e6ea21e25411 - Third Party Advisory | |
References | () https://groups.google.com/forum/#%21msg/redis-db/4Y6OqK8gEyk/Dg-5cejl-eUJ - | |
References | () https://security.gentoo.org/glsa/201702-16 - Third Party Advisory |
07 Nov 2023, 02:25
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2015-06-09 14:59
Updated : 2024-11-21 02:30
NVD link : CVE-2015-4335
Mitre link : CVE-2015-4335
CVE.ORG link : CVE-2015-4335
JSON object : View
Products Affected
debian
- debian_linux
redislabs
- redis
CWE
CWE-17
DEPRECATED: Code