CVE-2019-10193 vulnerability in Red Hat and Other Products
Published on July 11, 2019
A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker could cause Redis to perform controlled increments of up to 12 bytes past the end of a stack-allocated buffer.
Weakness Type
What is a Stack Overflow Vulnerability?
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
CVE-2019-10193 has been classified to as a Stack Overflow vulnerability or weakness.
Products Associated with CVE-2019-10193
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2019-10193 are published in these products:
Affected Versions
Redis Labs redis:- Version 3.x before 3.2.13 is affected.
- Version 4.x before 4.0.14 is affected.
- Version 5.x before 5.0.4 is affected.
Exploit Probability
EPSS
27.97%
Percentile
96.40%
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.