Published on July 13th, 2019 📆 | 6278 Views ⚑
0Redis Hyperloglog Data Structure up to 3.2.12/4.0.13/5.0.3 Command Heap-based memory corruption
CVSS Meta Temp Score | Current Exploit Price (β) |
---|---|
5.3 | $0-$5k |
A vulnerability was found in Redis Hyperloglog Data Structure up to 3.2.12/4.0.13/5.0.3. It has been declared as critical. This vulnerability affects some unknown processing of the component Command Handler. The manipulation with an unknown input leads to a memory corruption vulnerability (Heap-based). The CWE definition for the vulnerability is CWE-122. As an impact it is known to affect confidentiality, integrity, and availability.
The weakness was disclosed 07/11/2019 as bug report (Bugzilla). The advisory is shared for download at bugzilla.redhat.com. This vulnerability was named CVE-2019-10192 since 03/27/2019. There are neither technical details nor an exploit publicly available.
Upgrading to version 3.2.13, 4.0.14 or 5.0.4 eliminates this vulnerability.
The entry 137753 is pretty similar.
Vendor
Name
VulDB Meta Base Score: 5.5
VulDB Meta Temp Score: 5.3
VulDB Base Score: β5.5
VulDB Temp Score: β5.3
VulDB Vector: π
VulDB Reliability: π
VulDB Base Score: π
VulDB Temp Score: π
VulDB Reliability: π
Class: Memory corruption / Heap-based (CWE-122)
Local: Yes
Remote: No
Availability: π
Status: Not defined
Price Prediction: π
Current Price Estimation: π
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Threat: π
Adversaries: π
Geopolitics: π
Economy: π
Predictions: π
Remediation: πRecommended: Upgrade
Status: π
0-Day Time: π
Upgrade: Hyperloglog Data Structure 3.2.13/4.0.14/5.0.4
03/27/2019 CVE assigned
07/11/2019 Advisory disclosed
07/12/2019 VulDB entry created
07/12/2019 VulDB last updateAdvisory: bugzilla.redhat.com
CVE: CVE-2019-10192 (π)
See also: π
Created: 07/12/2019 08:51 AM
Complete: π
Comments
Upgrade your account now!
https://vuldb.com/?id.137752
No comments yet. Please log in to comment.