Description
A buffer overflow in Redis 3.2.x prior to 3.2.4 causes arbitrary code execution when a crafted command is sent. An out of bounds write vulnerability exists in the handling of the client-output-buffer-limit option during the CONFIG SET command for the Redis data structure store. A crafted CONFIG SET command can lead to an out of bounds write potentially resulting in code execution.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2016-9187 | A buffer overflow in Redis 3.2.x prior to 3.2.4 causes arbitrary code execution when a crafted command is sent. An out of bounds write vulnerability exists in the handling of the client-output-buffer-limit option during the CONFIG SET command for the Redis data structure store. A crafted CONFIG SET command can lead to an out of bounds write potentially resulting in code execution. |
References
History
No history.
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2024-08-06T02:20:30.582Z
Reserved: 2016-09-28T00:00:00.000Z
Link: CVE-2016-8339
No data.
Status : Modified
Published: 2016-10-28T14:59:01.603
Modified: 2026-05-06T22:30:45.220
Link: CVE-2016-8339
OpenCVE Enrichment
No data.
Weaknesses
EUVD