Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-7239

Опубликовано: 13 янв. 2014
Источник: debian
EPSS Низкий

Описание

memcached before 1.4.17 allows remote attackers to bypass authentication by sending an invalid request with SASL credentials, then sending another request with incorrect SASL credentials.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
memcachedfixed1.4.13-0.3package
memcachednot-affectedsqueezepackage

Примечания

  • https://code.google.com/p/memcached/wiki/ReleaseNotes1417

  • https://code.google.com/p/memcached/issues/detail?id=316

  • https://github.com/memcached/memcached/commit/87c1cf0f20be20608d3becf854e9cf0910f4ad32

EPSS

Процентиль: 56%
0.00337
Низкий

Связанные уязвимости

ubuntu
около 12 лет назад

memcached before 1.4.17 allows remote attackers to bypass authentication by sending an invalid request with SASL credentials, then sending another request with incorrect SASL credentials.

redhat
почти 13 лет назад

memcached before 1.4.17 allows remote attackers to bypass authentication by sending an invalid request with SASL credentials, then sending another request with incorrect SASL credentials.

nvd
около 12 лет назад

memcached before 1.4.17 allows remote attackers to bypass authentication by sending an invalid request with SASL credentials, then sending another request with incorrect SASL credentials.

github
больше 3 лет назад

memcached before 1.4.17 allows remote attackers to bypass authentication by sending an invalid request with SASL credentials, then sending another request with incorrect SASL credentials.

fstec
больше 11 лет назад

Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

EPSS

Процентиль: 56%
0.00337
Низкий