Redis CONFIG SET... CVE-2016-8339 CNNVD-201610-857

7.5 AV AC AU C I A
发布: 2016-10-28
修订: 2023-01-30

### Summary An out of bounds write vulnerability exists in the handling of the client-output-buffer-limit option during the CONFIG SET command for the Redis data structure store. A crafted CONFIG SET command can lead to an out of bounds write potentially resulting in code execution. ### Tested Versions Redis - 3.2.3 ### Product URLs http://redis.io/ ### CVSSv3 Score 6.6 - CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H ### Details Redis is a simple in-memory data structure store using a key-value model. Redis has been growing in popularity due to its ability to handle problems that other databases can't solve or are inherently slow at. An out of bounds write vulnerability exists during the modification of the `client-output-buffer-limit` option using the `CONFIG SET` command. The required syntax for setting the `client-output-buffer-limit` option is shown below. ``` CONFIG SET client-output-buffer-limit <class> <hard limit> <soft limit> <soft seconds> ``` This option sets the limits...

0%
暂无可用Exp或PoC
当前有4条受影响产品信息