CVE-2019-10192
11.07.2019, 19:15
A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer.Enginsight
Vendor | Product | Version |
---|---|---|
redislabs | redis | 3.0.0 ≤ 𝑥 < 3.2.13 |
redislabs | redis | 4.0.0 ≤ 𝑥 < 4.0.14 |
redislabs | redis | 5.0 ≤ 𝑥 < 5.0.4 |
redhat | software_collections | 1.0 |
redhat | enterprise_linux | 8.0 |
redhat | enterprise_linux_eus | 8.1 |
redhat | enterprise_linux_eus | 8.2 |
redhat | enterprise_linux_eus | 8.4 |
redhat | enterprise_linux_server_aus | 8.2 |
redhat | enterprise_linux_server_aus | 8.4 |
redhat | enterprise_linux_server_tus | 8.2 |
redhat | enterprise_linux_server_tus | 8.4 |
debian | debian_linux | 9.0 |
debian | debian_linux | 10.0 |
canonical | ubuntu_linux | 16.04 |
canonical | ubuntu_linux | 18.04 |
canonical | ubuntu_linux | 19.04 |
oracle | communications_operations_monitor | 3.4 |
oracle | communications_operations_monitor | 4.1 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
- CWE-122 - Heap-based Buffer OverflowA heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
- CWE-787 - Out-of-bounds WriteThe software writes data past the end, or before the beginning, of the intended buffer.
References