APP: Redis HyperLogLog hllCount Stack Buffer Overflow
This signature detects attempts to exploit a known vulnerability in Redis. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user.
Extended Description
A stack-buffer overflow vulnerability was found in the Redis hyperloglog data structure versions 3.x before 3.2.13, 4.x before 4.0.14 and 5.x before 5.0.4. By corrupting a hyperloglog using the SETRANGE command, an attacker could cause Redis to perform controlled increments of up to 12 bytes past the end of a stack-allocated buffer.
Affected Products
Redhat enterprise_linux_server_tus
srx-branch-19.3
vsrx3bsd-19.2
srx-19.4
vsrx3bsd-19.4
srx-branch-19.4
vsrx-19.4
vsrx-19.2
srx-19.3
srx-branch-12.3
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx-12.3
vmx-19.3
srx-12.3
Redislabs
Oracle
Debian
Redhat
Canonical
6.5