CVE-2019-10193
Severity
7.2HIGH
EPSS
28.0%
top 3.53%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 11
Latest updateMay 24
Description
A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker could cause Redis to perform controlled increments of up to 12 bytes past the end of a stack-allocated buffer.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 1.2 | Impact: 5.9
Affected Packages5 packages
Also affects: Debian Linux 10.0, 9.0, Ubuntu Linux 16.04, 18.04, 19.04, Enterprise Linux 8.0, 8.1, 8.2, 8.4
Patches
🔴Vulnerability Details
3GHSA▶
GHSA-7c9p-23p9-r8x2: A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3↗2022-05-24
OSV▶
CVE-2019-10193: A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3↗2019-07-11
CVEList▶
CVE-2019-10193: A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3↗2019-07-11