CVE-2015-4335

Redis <2.8.21, <3.0.2 - RCE

Title source: llm
STIX 2.1

Description

Redis before 2.8.21 and 3.x before 3.0.2 allows remote attackers to execute arbitrary Lua bytecode via the eval command.

References (13)

Core 13
Core References
Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162146.html
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2015/06/04/8
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2015/06/04/12
Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-updates/2015-10/msg00014.html
Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162094.html
Third Party Advisory vendor-advisory x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2015-1676.html
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/75034
Mailing List, Third Party Advisory mailing-list x_refsource_mlist
http://www.openwall.com/lists/oss-security/2015/06/05/3
Third Party Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2015/dsa-3279
Third Party Advisory vendor-advisory x_refsource_gentoo
https://security.gentoo.org/glsa/201702-16

Scores

EPSS 0.0813
EPSS Percentile 92.2%

Details

CWE
CWE-17
Status published
Products (5)
debian/debian_linux 8.0
debian/debian_linux 9.0
redislabs/redis 3.0.0
redislabs/redis 3.0.1
redislabs/redis < 2.8.20
Published Jun 09, 2015
Tracked Since Feb 18, 2026