漏洞信息详情
Redis hyperloglog data structure 缓冲区错误漏洞
漏洞简介
Redis Labs Redis是美国Redis Labs公司的一套开源的使用ANSI C编写、支持网络、可基于内存亦可持久化的日志型、键值(Key-Value)存储数据库,并提供多种语言的API。hyperloglog是其中的一个用于做基数统计的数据结构。
Redis hyperloglog data structure 3.2.13之前的3.x版本、4.0.14之前的4.x版本和5.0.4之前的5.x版本中存在缓冲区错误漏洞。该漏洞源于网络系统或产品在内存上执行操作时,未正确验证数据边界,导致向关联的其他内存位置上执行了错误的读写操作。攻击者可利用该漏洞导致缓冲区溢出或堆溢出等。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,详情请关注厂商主页:
http://redis.io/
参考网址
来源:CONFIRM
链接:https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10193
来源:MISC
链接:https://raw.githubusercontent.com/antirez/redis/3.2/00-RELEASENOTES
来源:GENTOO
链接:https://security.gentoo.org/glsa/201908-04
来源:MISC
链接:https://raw.githubusercontent.com/antirez/redis/5.0/00-RELEASENOTES
来源:MISC
链接:https://raw.githubusercontent.com/antirez/redis/4.0/00-RELEASENOTES
来源:BID
链接:http://www.securityfocus.com/bid/109290
来源:BUGTRAQ
链接:https://seclists.org/bugtraq/2019/Jul/19
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:1819
来源:github.com
链接:https://github.com/antirez/redis/commit/e216ceaf0e099536fe3658a29dcb725d812364e0
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2019-10193
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2019-10192
来源:github.com
链接:https://github.com/antirez/redis/issues/6215
来源:github.com
链接:https://github.com/antirez/redis/commit/9f13b2bd4967334b1701c6eccdf53760cb13f79e
来源:bugzilla.redhat.com
链接:https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10192
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2019:2002
来源:DEBIAN
链接:https://www.debian.org/security/2019/dsa-4480
来源:BID
链接:https://www.securityfocus.com/bid/109290
来源:MISC
链接:https://www.oracle.com/security-alerts/cpujul2020.html
来源:www.debian.org
链接:http://www.debian.org/security/2019/dsa-4480
来源:usn.ubuntu.com
链接:https://usn.ubuntu.com/4061-1/
来源:www.oracle.com
链接:https://www.oracle.com/security-alerts/cpujul2020.html
来源:www.securityfocus.com
链接:https://www.securityfocus.com/bid/109290
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/153621/Debian-Security-Advisory-4480-1.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.2606/
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2019-10193
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Redis-buffer-overflow-via-Hyperloglog-12-Bytes-29755
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.2644/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.2565/
受影响实体
暂无
补丁
- Redis hyperloglog data structure 缓冲区错误漏洞的修复措施<!--2019-7-11-->
还没有评论,来说两句吧...