Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-10193

Опубликовано: 19 июн. 2019
Источник: redhat
CVSS3: 7.2

Описание

A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker could cause Redis to perform controlled increments of up to 12 bytes past the end of a stack-allocated buffer.

A stack buffer overflow vulnerability was found in the Redis HyperLogLog data structure. By corrupting a HyperLogLog using the SETRANGE command, an attacker could cause Redis to perform controlled increments of up to 12 bytes past the end of a stack-allocated buffer.

Отчет

The following product versions are not affected because they do not ship the vulnerable code:

  • Red Hat OpenStack Platform, all versions
  • Red Hat Ceph Storage 3, which only ships the client-side part of Redis in its packaged Grafana.
  • Red Hat Gluster Storage 3, which only ships the client-side part of Redis in its packaged Grafana and Heketi.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ceph Storage 3grafanaNot affected
Red Hat OpenStack Platform 10 (Newton)redisNot affected
Red Hat OpenStack Platform 13 (Queens)redisNot affected
Red Hat OpenStack Platform 14 (Rocky)redisNot affected
Red Hat OpenStack Platform 9 (Mitaka)redisNot affected
Red Hat OpenStack Platform 9 (Mitaka) Operational ToolsredisNot affected
Red Hat Software Collectionsrh-redis32-redisNot affected
Red Hat Storage 3grafanaNot affected
Red Hat Storage 3heketiNot affected
Red Hat Enterprise Linux 8redisFixedRHSA-2019:200207.08.2019

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=1727668redis: Stack buffer overflow in HyperLogLog triggered by malicious client

7.2 High

CVSS3

Связанные уязвимости

CVSS3: 7.2
ubuntu
больше 6 лет назад

A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker could cause Redis to perform controlled increments of up to 12 bytes past the end of a stack-allocated buffer.

CVSS3: 7.2
nvd
больше 6 лет назад

A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker could cause Redis to perform controlled increments of up to 12 bytes past the end of a stack-allocated buffer.

CVSS3: 7.2
debian
больше 6 лет назад

A stack-buffer overflow vulnerability was found in the Redis hyperlogl ...

github
больше 3 лет назад

A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker could cause Redis to perform controlled increments of up to 12 bytes past the end of a stack-allocated buffer.

CVSS3: 7.2
fstec
больше 6 лет назад

Уязвимость алгоритма HyperLogLog резидентной системы управления базами данных класса NoSQL Redis, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании

7.2 High

CVSS3