An integer overflow in process_bin_sasl_auth function in Memcached, which is responsible for authentication commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.
References
Link | Resource |
---|---|
http://rhn.redhat.com/errata/RHSA-2016-2819.html | |
http://www.debian.org/security/2016/dsa-3704 | |
http://www.securityfocus.com/bid/94083 | |
http://www.securitytracker.com/id/1037333 | |
http://www.talosintelligence.com/reports/TALOS-2016-0221/ | Exploit Technical Description Third Party Advisory VDB Entry |
https://security.gentoo.org/glsa/201701-12 | |
http://rhn.redhat.com/errata/RHSA-2016-2819.html | |
http://www.debian.org/security/2016/dsa-3704 | |
http://www.securityfocus.com/bid/94083 | |
http://www.securitytracker.com/id/1037333 | |
http://www.talosintelligence.com/reports/TALOS-2016-0221/ | Exploit Technical Description Third Party Advisory VDB Entry |
https://security.gentoo.org/glsa/201701-12 |
Configurations
History
21 Nov 2024, 02:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://rhn.redhat.com/errata/RHSA-2016-2819.html - | |
References | () http://www.debian.org/security/2016/dsa-3704 - | |
References | () http://www.securityfocus.com/bid/94083 - | |
References | () http://www.securitytracker.com/id/1037333 - | |
References | () http://www.talosintelligence.com/reports/TALOS-2016-0221/ - Exploit, Technical Description, Third Party Advisory, VDB Entry | |
References | () https://security.gentoo.org/glsa/201701-12 - |
Information
Published : 2017-01-06 21:59
Updated : 2024-11-21 02:59
NVD link : CVE-2016-8706
Mitre link : CVE-2016-8706
CVE.ORG link : CVE-2016-8706
JSON object : View
Products Affected
memcached
- memcached
CWE
CWE-190
Integer Overflow or Wraparound