Executive Summary
Summary | |
---|---|
Title | memcached security update |
Informations | |||
---|---|---|---|
Name | DSA-4218 | First vendor Publication | 2018-06-06 |
Vendor | Debian | Last vendor Modification | 2018-06-06 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Several vulnerabilities were discovered in memcached, a high-performance memory object caching system. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2017-9951 Daniel Shapira reported a heap-based buffer over-read in memcached (resulting from an incomplete fix for CVE-2016-8705) triggered by specially crafted requests to add/set a key and allowing a remote attacker to cause a denial of service. CVE-2018-1000115 It was reported that memcached listens to UDP by default. A remote attacker can take advantage of it to use the memcached service as a DDoS amplifier. Default installations of memcached in Debian are not affected by this issue as the installation defaults to listen only on localhost. This update disables the UDP port by default. Listening on the UDP can be re-enabled in the /etc/memcached.conf (cf. /usr/share/doc/memcached/NEWS.Debian.gz). CVE-2018-1000127 An integer overflow was reported in memcached, resulting in resource leaks, data corruption, deadlocks or crashes. For the oldstable distribution (jessie), these problems have been fixed in version 1.4.21-1.1+deb8u2. For the stable distribution (stretch), these problems have been fixed in version 1.4.33-1+deb9u1. We recommend that you upgrade your memcached packages. For the detailed security status of memcached please refer to its security tracker page at: https://security-tracker.debian.org/tracker/memcached |
Original Source
Url : http://www.debian.org/security/2018/dsa-4218 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-190 | Integer Overflow or Wraparound (CWE/SANS Top 25) |
25 % | CWE-667 | Insufficient Locking |
25 % | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2018-10-09 | Memcached DDoS attempt RuleID : 47726 - Revision : 1 - Type : SERVER-OTHER |
2018-10-09 | Memcached DDoS attempt RuleID : 47725 - Revision : 1 - Type : SERVER-OTHER |
2018-10-09 | Memcached DDoS attempt RuleID : 47724 - Revision : 1 - Type : SERVER-OTHER |
2018-04-12 | Memcached DDoS reflective attempt RuleID : 45942 - Revision : 1 - Type : SERVER-OTHER |
2018-04-12 | Memcached replaceq opcode request heap buffer overflow attempt RuleID : 45940 - Revision : 1 - Type : SERVER-OTHER |
2018-04-12 | Memcached replace opcode request heap buffer overflow attempt RuleID : 45939 - Revision : 1 - Type : SERVER-OTHER |
2018-04-12 | Memcached addq opcode request heap buffer overflow attempt RuleID : 45938 - Revision : 1 - Type : SERVER-OTHER |
2018-04-12 | Memcached add opcode request heap buffer overflow attempt RuleID : 45937 - Revision : 1 - Type : SERVER-OTHER |
2018-04-12 | Memcached setq opcode request heap buffer overflow attempt RuleID : 45936 - Revision : 1 - Type : SERVER-OTHER |
2018-04-12 | Memcached set opcode request heap buffer overflow attempt RuleID : 45935 - Revision : 1 - Type : SERVER-OTHER |
2016-10-18 | Memcached replaceq opcode request heap buffer overflow attempt RuleID : 40481 - Revision : 4 - Type : SERVER-OTHER |
2016-10-18 | Memcached replace opcode request heap buffer overflow attempt RuleID : 40480 - Revision : 4 - Type : SERVER-OTHER |
2016-10-18 | Memcached addq opcode request heap buffer overflow attempt RuleID : 40479 - Revision : 4 - Type : SERVER-OTHER |
2016-10-18 | Memcached add opcode request heap buffer overflow attempt RuleID : 40478 - Revision : 4 - Type : SERVER-OTHER |
2016-10-18 | Memcached setq opcode request heap buffer overflow attempt RuleID : 40477 - Revision : 4 - Type : SERVER-OTHER |
2016-10-18 | Memcached set opcode request heap buffer overflow attempt RuleID : 40476 - Revision : 4 - Type : SERVER-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2018-07-03 | Name : The remote EulerOS host is missing a security update. File : EulerOS_SA-2018-1177.nasl - Type : ACT_GATHER_INFO |
2018-06-07 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-4218.nasl - Type : ACT_GATHER_INFO |
2018-05-29 | Name : The remote EulerOS host is missing a security update. File : EulerOS_SA-2018-1138.nasl - Type : ACT_GATHER_INFO |
2018-04-18 | Name : The remote Amazon Linux 2 host is missing a security update. File : al2_ALAS-2018-964.nasl - Type : ACT_GATHER_INFO |
2018-03-30 | Name : The remote Debian host is missing a security update. File : debian_DLA-1329.nasl - Type : ACT_GATHER_INFO |
2018-03-09 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2018-964.nasl - Type : ACT_GATHER_INFO |
2017-07-21 | Name : The remote Debian host is missing a security update. File : debian_DLA-1033.nasl - Type : ACT_GATHER_INFO |
2017-05-01 | Name : The remote EulerOS host is missing multiple security updates. File : EulerOS_SA-2016-1086.nasl - Type : ACT_GATHER_INFO |
2017-01-03 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201701-12.nasl - Type : ACT_GATHER_INFO |
2016-12-15 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20161123_memcached_on_SL7_x.nasl - Type : ACT_GATHER_INFO |
2016-12-08 | Name : The remote Fedora host is missing a security update. File : fedora_2016-0c4e822340.nasl - Type : ACT_GATHER_INFO |
2016-11-29 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2016-2820.nasl - Type : ACT_GATHER_INFO |
2016-11-28 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2016-2819.nasl - Type : ACT_GATHER_INFO |
2016-11-23 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20161123_memcached_on_SL6_x.nasl - Type : ACT_GATHER_INFO |
2016-11-23 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2016-2820.nasl - Type : ACT_GATHER_INFO |
2016-11-23 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2016-2819.nasl - Type : ACT_GATHER_INFO |
2016-11-23 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2016-2820.nasl - Type : ACT_GATHER_INFO |
2016-11-23 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2016-2819.nasl - Type : ACT_GATHER_INFO |
2016-11-18 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-1314.nasl - Type : ACT_GATHER_INFO |
2016-11-18 | Name : The remote openSUSE host is missing a security update. File : openSUSE-2016-1313.nasl - Type : ACT_GATHER_INFO |
2016-11-15 | Name : The remote Fedora host is missing a security update. File : fedora_2016-66c70cadb4.nasl - Type : ACT_GATHER_INFO |
2016-11-15 | Name : The remote Fedora host is missing a security update. File : fedora_2016-4df986a71f.nasl - Type : ACT_GATHER_INFO |
2016-11-11 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2016-761.nasl - Type : ACT_GATHER_INFO |
2016-11-07 | Name : The remote Debian host is missing a security update. File : debian_DLA-701.nasl - Type : ACT_GATHER_INFO |
2016-11-04 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-3704.nasl - Type : ACT_GATHER_INFO |
2016-11-03 | Name : The remote Ubuntu host is missing a security-related patch. File : ubuntu_USN-3120-1.nasl - Type : ACT_GATHER_INFO |
2016-11-02 | Name : The remote FreeBSD host is missing a security-related update. File : freebsd_pkg_f4bf713f6ac74b76898047bf90c5419f.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2018-06-06 21:18:58 |
|