CVE-2016-8339
Summary
| CVE | CVE-2016-8339 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2016-10-28 14:59:00 UTC |
| Updated | 2023-01-30 19:50:00 UTC |
| Description | A buffer overflow in Redis 3.2.x prior to 3.2.4 causes arbitrary code execution when a crafted command is sent. An out of bounds write vulnerability exists in the handling of the client-output-buffer-limit option during the CONFIG SET command for the Redis data structure store. A crafted CONFIG SET command can lead to an out of bounds write potentially resulting in code execution. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Cisco Talos - Talos 2016 0206 |
MISC |
www.talosintelligence.com |
Exploit, Third Party Advisory |
| Redis: Multiple vulnerabilities (GLSA 201702-16) — Gentoo security |
GENTOO |
security.gentoo.org |
Third Party Advisory |
| Redis CVE-2016-8339 Out of Bounds Remote Code Execution Vulnerability |
BID |
www.securityfocus.com |
Third Party Advisory, VDB Entry |
| Security: CONFIG SET client-output-buffer-limit overflow fixed. · antirez/redis@6d9f8e2 · GitHub |
MISC |
github.com |
Issue Tracking, Patch |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 710432 Gentoo Linux Redis Multiple Vulnerabilities (GLSA 201702-16)