redhat openstack CVE-2019-10193 vulnerability in Red Hat and Other Products
Published on July 11, 2019

product logo product logo product logo product logo product logo
A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker could cause Redis to perform controlled increments of up to 12 bytes past the end of a stack-allocated buffer.

Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory Vendor Advisory NVD

Weakness Type

What is a Stack Overflow Vulnerability?

A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).

CVE-2019-10193 has been classified to as a Stack Overflow vulnerability or weakness.


Products Associated with CVE-2019-10193

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2019-10193 are published in these products:

 
 
 
 
 
 
 
 
 

Affected Versions

Redis Labs redis:

Exploit Probability

EPSS
27.97%
Percentile
96.40%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.