Severity
7.2HIGH
EPSS
28.0%
top 3.53%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 11
Latest updateMay 24

Description

A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker could cause Redis to perform controlled increments of up to 12 bytes past the end of a stack-allocated buffer.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 1.2 | Impact: 5.9

Affected Packages5 packages

NVDredislabs/redis3.0.03.2.13+2
Debianredis< 5:5.0.4-1+3
CVEListV5redis_labs/redis3.x before 3.2.13, 4.x before 4.0.14, 5.x before 5.0.4+2
NVDredhat/openstack4 versions+3

Also affects: Debian Linux 10.0, 9.0, Ubuntu Linux 16.04, 18.04, 19.04, Enterprise Linux 8.0, 8.1, 8.2, 8.4

Patches

🔴Vulnerability Details

3
GHSA
GHSA-7c9p-23p9-r8x2: A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 32022-05-24
OSV
CVE-2019-10193: A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 32019-07-11
CVEList
CVE-2019-10193: A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 32019-07-11

📋Vendor Advisories

4
Oracle
Oracle Oracle Communications Applications Risk Matrix: FDP, VSP Login, Packet Inspector (Redis) — CVE-2019-101932020-07-15
Ubuntu
Redis vulnerabilities2019-07-16
Red Hat
redis: Stack buffer overflow in HyperLogLog triggered by malicious client2019-06-19
Debian
CVE-2019-10193: redis - A stack-buffer overflow vulnerability was found in the Redis hyperloglog data st...2019

💬Community

2
Bugzilla
CVE-2019-10193 redis: Stack buffer overflow in HyperLogLog triggered by malicious client [openstack-rdo]2019-07-08
Bugzilla
CVE-2019-10193 redis: Stack buffer overflow in HyperLogLog triggered by malicious client2019-07-08