Severity
7.2HIGH
EPSS
21.6%
top 4.27%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 11
Latest updateMay 24

Description

A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 1.2 | Impact: 5.9

Affected Packages6 packages

NVDredislabs/redis3.0.03.2.13+2
Debianredis< 5:5.0.4-1+3
CVEListV5redis_labs/redis3.x before 3.2.13, 4.x before 4.0.14, 5.x before 5.0.4+2
NVDredhat/openstack4 versions+3

Also affects: Debian Linux 10.0, 9.0, Ubuntu Linux 16.04, 18.04, 19.04, Enterprise Linux 8.0, 8.1, 8.2, 8.4

Patches

🔴Vulnerability Details

3
GHSA
GHSA-pgcv-crqq-f8x5: A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 32022-05-24
CVEList
CVE-2019-10192: A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 32019-07-11
OSV
CVE-2019-10192: A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 32019-07-11

📋Vendor Advisories

3
Ubuntu
Redis vulnerabilities2019-07-16
Red Hat
redis: Heap buffer overflow in HyperLogLog triggered by malicious client2019-06-19
Debian
CVE-2019-10192: redis - A heap-buffer overflow vulnerability was found in the Redis hyperloglog data str...2019

💬Community

2
Bugzilla
CVE-2019-10192 redis: Heap buffer overflow in HyperLogLog triggered by malicious client [openstack-rdo]2019-07-08
Bugzilla
CVE-2019-10192 redis: Heap buffer overflow in HyperLogLog triggered by malicious client2019-06-25