Vulnerability Name:

CVE-2019-10193 (CCN-163670)

Assigned:2019-06-19
Published:2019-06-19
Updated:2021-10-28
Summary:A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker could cause Redis to perform controlled increments of up to 12 bytes past the end of a stack-allocated buffer.
CVSS v3 Severity:7.2 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)
6.3 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): High
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
9.8 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
7.2 High (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)
6.3 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): High
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-787
CWE-121
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2019-10193

Source: BID
Type: Third Party Advisory, VDB Entry
109290

Source: REDHAT
Type: Third Party Advisory
RHSA-2019:1819

Source: REDHAT
Type: Third Party Advisory
RHSA-2019:2002

Source: CONFIRM
Type: Issue Tracking, Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10193

Source: XF
Type: UNKNOWN
debian-cve201910193-bo(163670)

Source: CCN
Type: Debian Web site
Redis Package

Source: MISC
Type: Release Notes, Vendor Advisory
https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES

Source: MISC
Type: Release Notes, Vendor Advisory
https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES

Source: MISC
Type: Release Notes, Vendor Advisory
https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES

Source: BUGTRAQ
Type: Mailing List, Third Party Advisory
20190712 [SECURITY] [DSA 4480-1] redis security update

Source: CCN
Type: BugTraq Mailing List, Thu, 11 Jul 2019 20:59:49 +0000
redis security update

Source: GENTOO
Type: Third Party Advisory
GLSA-201908-04

Source: UBUNTU
Type: Third Party Advisory
USN-4061-1

Source: DEBIAN
Type: Third Party Advisory
DSA-4480

Source: CCN
Type: Oracle CPUJul2020
Oracle Critical Patch Update Advisory - July 2020

Source: MISC
Type: Patch, Third Party Advisory
https://www.oracle.com/security-alerts/cpujul2020.html

Vulnerable Configuration:Configuration 1:
  • cpe:/a:redislabs:redis:*:*:*:*:*:*:*:* (Version >= 5.0 and < 5.0.4)
  • OR cpe:/a:redislabs:redis:*:*:*:*:*:*:*:* (Version >= 4.0.0 and < 4.0.14)
  • OR cpe:/a:redislabs:redis:*:*:*:*:*:*:*:* (Version >= 3.0.0 and < 3.2.13)

  • Configuration 2:
  • cpe:/a:redhat:openstack:9:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:openstack:10:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:openstack:13:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:openstack:14:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/o:debian:debian_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:10.0:*:*:*:*:*:*:*

  • Configuration 4:
  • cpe:/o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

  • Configuration 5:
  • cpe:/a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*
  • OR cpe:/a:oracle:communications_operations_monitor:4.1:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.redhat.rhsa:def:20192002
    P
    RHSA-2019:2002: redis:5 security update (Important)
    2019-08-07
    oval:com.ubuntu.cosmic:def:2019101930000000
    V
    CVE-2019-10193 on Ubuntu 18.10 (cosmic) - medium.
    2019-07-11
    oval:com.ubuntu.bionic:def:2019101930000000
    V
    CVE-2019-10193 on Ubuntu 18.04 LTS (bionic) - medium.
    2019-07-11
    oval:com.ubuntu.xenial:def:2019101930000000
    V
    CVE-2019-10193 on Ubuntu 16.04 LTS (xenial) - medium.
    2019-07-11
    oval:com.ubuntu.disco:def:2019101930000000
    V
    CVE-2019-10193 on Ubuntu 19.04 (disco) - medium.
    2019-07-11
    BACK
    redislabs redis *
    redislabs redis *
    redislabs redis *
    redhat openstack 9
    redhat openstack 10
    redhat openstack 13
    redhat openstack 14
    redhat enterprise linux 8.0
    redhat enterprise linux eus 8.1
    redhat enterprise linux eus 8.2
    redhat enterprise linux eus 8.4
    redhat enterprise linux server aus 8.2
    redhat enterprise linux server aus 8.4
    redhat enterprise linux server tus 8.2
    redhat enterprise linux server tus 8.4
    debian debian linux 9.0
    debian debian linux 10.0
    canonical ubuntu linux 19.04
    canonical ubuntu linux 18.04
    canonical ubuntu linux 16.04
    oracle communications operations monitor 3.4
    oracle communications operations monitor 4.1
    oracle communications operations monitor 3.4