Описание
An integer overflow in process_bin_sasl_auth function in Memcached, which is responsible for authentication commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 1.4.25-2ubuntu3 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [1.4.14-0ubuntu9.1]] |
esm-infra/xenial | not-affected | 1.4.25-2ubuntu1.2 |
precise | released | 1.4.13-0ubuntu2.2 |
trusty | released | 1.4.14-0ubuntu9.1 |
trusty/esm | DNE | trusty was released [1.4.14-0ubuntu9.1] |
upstream | released | 1.4.33 |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE | |
xenial | released | 1.4.25-2ubuntu1.2 |
Показывать по
EPSS
6.8 Medium
CVSS2
8.1 High
CVSS3
Связанные уязвимости
An integer overflow in process_bin_sasl_auth function in Memcached, which is responsible for authentication commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.
An integer overflow in process_bin_sasl_auth function in Memcached, which is responsible for authentication commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.
An integer overflow in process_bin_sasl_auth function in Memcached, wh ...
An integer overflow in process_bin_sasl_auth function in Memcached, which is responsible for authentication commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.
EPSS
6.8 Medium
CVSS2
8.1 High
CVSS3