Memcached version 1.5.5 contains an Insufficient Control of Network Message Volume (Network Amplification, CWE-406) vulnerability in the UDP support of the memcached server that can result in denial of service via network flood (traffic amplification of 1:50,000 has been reported by reliable sources). This attack appear to be exploitable via network connectivity to port 11211 UDP. This vulnerability appears to have been fixed in 1.5.6 due to the disabling of the UDP protocol by default.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
21 Nov 2024, 03:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/errata/RHBA-2018:2140 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:1593 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:1627 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:2331 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:2857 - Third Party Advisory | |
References | () https://blogs.akamai.com/2018/03/memcached-fueled-13-tbps-attacks.html - Third Party Advisory | |
References | () https://github.com/memcached/memcached/commit/dbb7a8af90054bf4ef51f5814ef7ceb17d83d974 - Patch, Third Party Advisory | |
References | () https://github.com/memcached/memcached/issues/348 - Issue Tracking, Third Party Advisory | |
References | () https://github.com/memcached/memcached/wiki/ReleaseNotes156 - Third Party Advisory | |
References | () https://twitter.com/dormando/status/968579781729009664 - Third Party Advisory | |
References | () https://usn.ubuntu.com/3588-1/ - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4218 - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/44264/ - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/44265/ - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.synology.com/support/security/Synology_SA_18_07 - Third Party Advisory |
Information
Published : 2018-03-05 14:29
Updated : 2024-11-21 03:39
NVD link : CVE-2018-1000115
Mitre link : CVE-2018-1000115
CVE.ORG link : CVE-2018-1000115
JSON object : View
Products Affected
redhat
- openstack
canonical
- ubuntu_linux
memcached
- memcached
debian
- debian_linux
CWE
CWE-400
Uncontrolled Resource Consumption