Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-10192

Опубликовано: 19 июн. 2019
Источник: redhat
CVSS3: 7.2
EPSS Средний

Описание

A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer.

A heap buffer overflow vulnerability was found in the Redis HyperLogLog data structure. By carefully corrupting a HyperLogLog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding into writing up to 3 bytes beyond the end of a heap-allocated buffer.

Отчет

  • This issue did not affect the version of grafana(embeds redis) as shipped with Red Hat Gluster Storage 3 and Red Hat Ceph Storage 3 as it only ships client side part of redis implementation.
  • This issue did not affect the version of heketi(embeds redis) as shipped with Red Hat Gluster Storage 3 as it only ships client side part of redis implementation.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ceph Storage 3grafanaNot affected
Red Hat Storage 3grafanaNot affected
Red Hat Storage 3heketiNot affected
Red Hat Enterprise Linux 8redisFixedRHSA-2019:200207.08.2019
Red Hat OpenStack Platform 10.0 (Newton)redisFixedRHSA-2019:263004.09.2019
Red Hat OpenStack Platform 13.0 (Queens)redisFixedRHSA-2019:262804.09.2019
Red Hat OpenStack Platform 14.0 (Rocky)redisFixedRHSA-2019:262104.09.2019
Red Hat OpenStack Platform 9.0 (Mitaka)redisFixedRHSA-2019:250815.08.2019
Red Hat OpenStack Platform 9.0 Operational Tools for RHEL 7redisFixedRHSA-2019:250615.08.2019
Red Hat Software Collections for Red Hat Enterprise Linux 6rh-redis32-redisFixedRHSA-2019:186025.07.2019

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-122
https://bugzilla.redhat.com/show_bug.cgi?id=1723918redis: Heap buffer overflow in HyperLogLog triggered by malicious client

EPSS

Процентиль: 96%
0.21637
Средний

7.2 High

CVSS3

Связанные уязвимости

CVSS3: 7.2
ubuntu
больше 6 лет назад

A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer.

CVSS3: 7.2
nvd
больше 6 лет назад

A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer.

CVSS3: 7.2
debian
больше 6 лет назад

A heap-buffer overflow vulnerability was found in the Redis hyperloglo ...

github
больше 3 лет назад

A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer.

CVSS3: 7.2
fstec
больше 6 лет назад

Уязвимость алгоритма HyperLogLog резидентной системы управления базами данных класса NoSQL Redis, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании

EPSS

Процентиль: 96%
0.21637
Средний

7.2 High

CVSS3