A heap-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By carefully corrupting a hyperloglog using the SETRANGE command, an attacker could trick Redis interpretation of dense HLL encoding to write up to 3 bytes beyond the end of a heap-allocated buffer.
2019-07-11T19:15:12.627
2024-11-21T04:18:37.363
Modified
CVSSv3.1: 7.2 (HIGH)
AV:N/AC:L/Au:S/C:P/I:P/A:P
8.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | redislabs | redis | < 3.2.13 | Yes |
Application | redislabs | redis | < 4.0.14 | Yes |
Application | redislabs | redis | < 5.0.4 | Yes |
Application | redhat | openstack | 9 | Yes |
Application | redhat | openstack | 10 | Yes |
Application | redhat | openstack | 13 | Yes |
Application | redhat | openstack | 14 | Yes |
Application | redhat | software_collections | 1.0 | Yes |
Operating System | redhat | enterprise_linux | 8.0 | Yes |
Operating System | redhat | enterprise_linux_eus | 8.1 | Yes |
Operating System | redhat | enterprise_linux_eus | 8.2 | Yes |
Operating System | redhat | enterprise_linux_eus | 8.4 | Yes |
Operating System | redhat | enterprise_linux_server_aus | 8.2 | Yes |
Operating System | redhat | enterprise_linux_server_aus | 8.4 | Yes |
Operating System | redhat | enterprise_linux_server_tus | 8.2 | Yes |
Operating System | redhat | enterprise_linux_server_tus | 8.4 | Yes |
Operating System | debian | debian_linux | 9.0 | Yes |
Operating System | debian | debian_linux | 10.0 | Yes |
Operating System | canonical | ubuntu_linux | 16.04 | Yes |
Operating System | canonical | ubuntu_linux | 18.04 | Yes |
Operating System | canonical | ubuntu_linux | 19.04 | Yes |
Application | oracle | communications_operations_monitor | 3.4 | Yes |
Application | oracle | communications_operations_monitor | 4.1 | Yes |