memcached version prior to 1.4.37 contains an Integer Overflow vulnerability in items.c:item_free() that can result in data corruption and deadlocks due to items existing in hash table being reused from free list. This attack appear to be exploitable via network connectivity to the memcached service. This vulnerability appears to have been fixed in 1.4.37 and later.
References
Link | Resource |
---|---|
https://access.redhat.com/errata/RHSA-2018:2290 | Third Party Advisory |
https://github.com/memcached/memcached/commit/a8c4a82787b8b6c256d61bd5c42fb7f92d1bae00 | Patch Third Party Advisory |
https://github.com/memcached/memcached/issues/271 | Third Party Advisory |
https://github.com/memcached/memcached/wiki/ReleaseNotes1437 | Release Notes Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/03/msg00031.html | Mailing List Third Party Advisory |
https://usn.ubuntu.com/3601-1/ | Third Party Advisory |
https://www.debian.org/security/2018/dsa-4218 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2018-03-13 21:29
Updated : 2024-02-28 16:25
NVD link : CVE-2018-1000127
Mitre link : CVE-2018-1000127
CVE.ORG link : CVE-2018-1000127
JSON object : View
Products Affected
redhat
- openstack
canonical
- ubuntu_linux
memcached
- memcached
debian
- debian_linux