Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2020-14147
Description:An integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow. NOTE: this issue exists because of a CVE-2015-8080 regression.
Test IDs: 1.3.6.1.4.1.25623.1.1.10.2020.0312   1.3.6.1.4.1.25623.1.0.704731   1.3.6.1.4.1.25623.1.0.853308   1.3.6.1.4.1.25623.1.0.113812  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2020-14147
Debian Security Information: DSA-4731 (Google Search)
https://www.debian.org/security/2020/dsa-4731
https://security.gentoo.org/glsa/202008-17
https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571
https://github.com/antirez/redis/commit/ef764dde1cca2f25d00686673d1bc89448819571
https://github.com/antirez/redis/pull/6875
https://github.com/antirez/redis/pull/6875
https://www.oracle.com/security-alerts/cpujan2021.html
https://www.oracle.com/security-alerts/cpujan2021.html
SuSE Security Announcement: openSUSE-SU-2020:1035 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00058.html




© 1998-2025 E-Soft Inc. All rights reserved.