{"id":"CVE-2016-8339","details":"A buffer overflow in Redis 3.2.x prior to 3.2.4 causes arbitrary code execution when a crafted command is sent. An out of bounds write vulnerability exists in the handling of the client-output-buffer-limit option during the CONFIG SET command for the Redis data structure store. A crafted CONFIG SET command can lead to an out of bounds write potentially resulting in code execution.","modified":"2026-03-20T11:15:37.511151Z","published":"2016-10-28T14:59:01.603Z","related":["SUSE-OU-2020:3291-1","openSUSE-SU-2024:10552-1"],"references":[{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201702-16"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/93283"},{"type":"FIX","url":"https://github.com/antirez/redis/commit/6d9f8e2462fc2c426d48c941edeb78e5df7d2977"},{"type":"EVIDENCE","url":"http://www.talosintelligence.com/reports/TALOS-2016-0206/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/antirez/redis","events":[{"introduced":"0"},{"fixed":"6d9f8e2462fc2c426d48c941edeb78e5df7d2977"}]},{"type":"GIT","repo":"https://github.com/redis/redis","events":[{"introduced":"0"},{"last_affected":"7ca8fbabe2081b0c8f72074cdd8dd7ef1863b86c"},{"introduced":"0"},{"last_affected":"04c7261f03cc423bcc089b27b5a24ad260279b22"},{"introduced":"0"},{"last_affected":"7c6e288d76c976456e1e9e74af5d8a87d44f536b"},{"introduced":"0"},{"last_affected":"44bf2533cdb2d753316e654c1b6dfd2298841433"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.2.0"},{"introduced":"0"},{"last_affected":"3.2.1"},{"introduced":"0"},{"last_affected":"3.2.2"},{"introduced":"0"},{"last_affected":"3.2.3"}]}}],"versions":["1.3.6","2.2-alpha0","2.2-alpha1","2.2-alpha2","2.2-alpha3","2.2-alpha4","2.2-alpha5","2.2-alpha6","2.2.0-rc1","2.3-alpha0","3.0-alpha0","3.2-rc1","3.2.0","3.2.0-rc2","3.2.0-rc3","v1.3.10","v1.3.11","v1.3.12","v1.3.7","v1.3.8","v1.3.9","v2.0.0-rc1","v2.1.1-watch","vm-playpen","with-deprecated-diskstore"],"database_specific":{"vanir_signatures":[{"signature_version":"v1","deprecated":false,"source":"https://github.com/antirez/redis/commit/6d9f8e2462fc2c426d48c941edeb78e5df7d2977","signature_type":"Function","target":{"file":"src/config.c","function":"loadServerConfigFromString"},"id":"CVE-2016-8339-6d6491f2","digest":{"function_hash":"288492418366398193303725864291513460548","length":20691}},{"signature_version":"v1","deprecated":false,"source":"https://github.com/antirez/redis/commit/6d9f8e2462fc2c426d48c941edeb78e5df7d2977","signature_type":"Function","target":{"file":"src/config.c","function":"configSetCommand"},"id":"CVE-2016-8339-755949fa","digest":{"function_hash":"79753074659388814966259388123951702147","length":10836}},{"signature_version":"v1","deprecated":false,"source":"https://github.com/antirez/redis/commit/6d9f8e2462fc2c426d48c941edeb78e5df7d2977","signature_type":"Line","target":{"file":"src/config.c"},"id":"CVE-2016-8339-9da90dd0","digest":{"line_hashes":["91929518650114403327479648356929727639","303707289483299645619714070913754686532","287044286968905208952100017543816714323","28091040296025360747264416505429866000","167937454072435407816312399222765377847","149716668783901345383030198957770556016","129673522462979996686646850885308060976","146918925904832260602599581829556198245","31366338915807168348761730859865025775"],"threshold":0.9}}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-8339.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}