Learn about CVE-2020-14147, an integer overflow vulnerability in Redis before 6.0.3 allowing denial of service attacks and sandbox restriction bypass. Find mitigation steps here.
An integer overflow vulnerability in Redis before version 6.0.3 could allow attackers running Lua code in a Redis session to cause a denial of service or bypass sandbox restrictions.
Understanding CVE-2020-14147
This CVE involves an integer overflow issue in Redis that could lead to memory corruption and application crashes.
What is CVE-2020-14147?
The vulnerability stems from an integer overflow in the getnum function in lua_struct.c in Redis before version 6.0.3. Attackers with permission to execute Lua code in a Redis session can exploit this flaw to trigger a stack-based buffer overflow, potentially resulting in a denial of service or bypassing sandbox restrictions.
The Impact of CVE-2020-14147
The vulnerability could allow context-dependent attackers to disrupt Redis service, leading to memory corruption, application crashes, and potential bypassing of security sandbox restrictions.
Technical Details of CVE-2020-14147
This section provides more technical insights into the vulnerability.
Vulnerability Description
The integer overflow in the getnum function in lua_struct.c in Redis before 6.0.3 allows attackers to trigger a stack-based buffer overflow, leading to memory corruption and potential application crashes.
Affected Systems and Versions
Exploitation Mechanism
Attackers can exploit this vulnerability by providing a large number as input to the getnum function, triggering the stack-based buffer overflow.
Mitigation and Prevention
Protecting systems from CVE-2020-14147 requires immediate actions and long-term security practices.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates