CVE-2016-8706

An integer overflow in process_bin_sasl_auth function in Memcached, which is responsible for authentication commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.
Configurations

Configuration 1 (hide)

cpe:2.3:a:memcached:memcached:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:59

Type Values Removed Values Added
References () http://rhn.redhat.com/errata/RHSA-2016-2819.html - () http://rhn.redhat.com/errata/RHSA-2016-2819.html -
References () http://www.debian.org/security/2016/dsa-3704 - () http://www.debian.org/security/2016/dsa-3704 -
References () http://www.securityfocus.com/bid/94083 - () http://www.securityfocus.com/bid/94083 -
References () http://www.securitytracker.com/id/1037333 - () http://www.securitytracker.com/id/1037333 -
References () http://www.talosintelligence.com/reports/TALOS-2016-0221/ - Exploit, Technical Description, Third Party Advisory, VDB Entry () http://www.talosintelligence.com/reports/TALOS-2016-0221/ - Exploit, Technical Description, Third Party Advisory, VDB Entry
References () https://security.gentoo.org/glsa/201701-12 - () https://security.gentoo.org/glsa/201701-12 -

Information

Published : 2017-01-06 21:59

Updated : 2024-11-21 02:59


NVD link : CVE-2016-8706

Mitre link : CVE-2016-8706

CVE.ORG link : CVE-2016-8706


JSON object : View

Products Affected

memcached

  • memcached
CWE
CWE-190

Integer Overflow or Wraparound