6.5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
7.2 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
0.188 Low
EPSS
Percentile
96.3%
A stack-buffer overflow vulnerability was found in the Redis hyperloglog
data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before
5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker
could cause Redis to perform controlled increments of up to 12 bytes past
the end of a stack-allocated buffer.
bugzilla.redhat.com/show_bug.cgi?id=1727668
bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10193
github.com/antirez/redis/commit/12b5ff109508c2a192f700c7738da7e7f09670f1 (5.0.4)
github.com/antirez/redis/commit/a4b90be9fcd5e1668ac941cabce3b1ab38dbe326 (master)
github.com/antirez/redis/issues/6214
github.com/antirez/redis/issues/6215 (upstream announcement)
launchpad.net/bugs/cve/CVE-2019-10193
nvd.nist.gov/vuln/detail/CVE-2019-10193
raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES
raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES
raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES
security-tracker.debian.org/tracker/CVE-2019-10193
ubuntu.com/security/notices/USN-4061-1
www.cve.org/CVERecord?id=CVE-2019-10193
6.5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:S/C:P/I:P/A:P
7.2 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
0.188 Low
EPSS
Percentile
96.3%