Multiple integer signedness errors in the (1) process_bin_sasl_auth, (2) process_bin_complete_sasl_auth, (3) process_bin_update, and (4) process_bin_append_prepend functions in Memcached 1.4.5 and earlier allow remote attackers to cause a denial of service (crash) via a large body length value in a packet.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://insecurety.net/?p=872 - Exploit | |
References | () http://secunia.com/advisories/56183 - | |
References | () http://www.debian.org/security/2014/dsa-2832 - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2013:280 - | |
References | () http://www.securityfocus.com/bid/59567 - | |
References | () http://www.ubuntu.com/usn/USN-2080-1 - | |
References | () https://code.google.com/p/memcached/issues/detail?id=192 - Exploit, Patch | |
References | () https://puppet.com/security/cve/cve-2011-4971 - |
Information
Published : 2013-12-12 18:55
Updated : 2024-11-21 01:33
NVD link : CVE-2011-4971
Mitre link : CVE-2011-4971
CVE.ORG link : CVE-2011-4971
JSON object : View
Products Affected
memcached
- memcached
CWE
CWE-189
Numeric Errors