HIGH · 7.2

CVE-2019-10192

A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using t...

Vulnerability Description

A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer.

CVSS Score

7.2

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
RedislabsRedis>= 3.0.0, < 3.2.13
RedhatOpenstack9
RedhatSoftware Collections1.0
RedhatEnterprise Linux8.0
RedhatEnterprise Linux Eus8.1
RedhatEnterprise Linux Server Aus8.2
RedhatEnterprise Linux Server Tus8.2
DebianDebian Linux9.0
CanonicalUbuntu Linux16.04
OracleCommunications Operations Monitor3.4

Related Weaknesses (CWE)

References

FAQ

What is CVE-2019-10192?

CVE-2019-10192 is a vulnerability with a CVSS score of 7.2 (HIGH). A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using t...

How severe is CVE-2019-10192?

CVE-2019-10192 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2019-10192?

Check the references section above for vendor advisories and patch information. Affected products include: Redislabs Redis, Redhat Openstack, Redhat Software Collections, Redhat Enterprise Linux, Redhat Enterprise Linux Eus.