Lucene search

K
ubuntucveUbuntu.comUB:CVE-2016-8339
HistoryOct 28, 2016 - 12:00 a.m.

CVE-2016-8339

2016-10-2800:00:00
ubuntu.com
ubuntu.com
8

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.01 Low

EPSS

Percentile

83.8%

A buffer overflow in Redis 3.2.x prior to 3.2.4 causes arbitrary code
execution when a crafted command is sent. An out of bounds write
vulnerability exists in the handling of the client-output-buffer-limit
option during the CONFIG SET command for the Redis data structure store. A
crafted CONFIG SET command can lead to an out of bounds write potentially
resulting in code execution.

Notes

Author Note
leosilva according with notes in upstream patch versions are affected only after 3.2.

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.01 Low

EPSS

Percentile

83.8%