Unrated severityNVD Advisory· Published Jun 9, 2015· Updated May 6, 2026
CVE-2015-4335
CVE-2015-4335
Description
Redis before 2.8.21 and 3.x before 3.0.2 allows remote attackers to execute arbitrary Lua bytecode via the eval command.
Affected products
5cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
13- benmmurphy.github.io/blog/2015/06/04/redis-eval-lua-sandbox-escape/nvdExploitThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2015-July/162094.htmlnvdThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2015-July/162146.htmlnvdThird Party Advisory
- lists.opensuse.org/opensuse-updates/2015-10/msg00014.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2015-1676.htmlnvdThird Party Advisory
- www.debian.org/security/2015/dsa-3279nvdThird Party Advisory
- www.openwall.com/lists/oss-security/2015/06/04/12nvdMailing ListThird Party Advisory
- www.openwall.com/lists/oss-security/2015/06/04/8nvdMailing ListThird Party Advisory
- www.openwall.com/lists/oss-security/2015/06/05/3nvdMailing ListThird Party Advisory
- www.securityfocus.com/bid/75034nvdThird Party AdvisoryVDB Entry
- github.com/antirez/redis/commit/fdf9d455098f54f7666c702ae464e6ea21e25411nvdThird Party Advisory
- security.gentoo.org/glsa/201702-16nvdThird Party Advisory
- groups.google.com/forum/nvd
News mentions
0No linked articles in our index yet.