Executive Summary
Summary | |
---|---|
Title | Memcached vulnerabilities |
Informations | |||
---|---|---|---|
Name | USN-3588-1 | First vendor Publication | 2018-03-05 |
Vendor | Ubuntu | Last vendor Modification | 2018-03-05 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 17.10 - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS Summary: Several security issues were fixed in Memcached. Software Description: - memcached: high-performance memory object caching system Details: Daniel Shapira discovered an integer overflow issue in Memcached. A remote attacker could use this to cause a denial of service (daemon crash). (CVE-2017-9951) It was discovered that Memcached listened to UDP by default. A remote attacker could use this as part of a distributed denial of service attack. (CVE-2018-1000115) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 17.10: Ubuntu 16.04 LTS: Ubuntu 14.04 LTS: In general, a standard system update will make all the necessary changes. Please note that after applying this update, Memcached will no longer listen to UDP by default. If UDP service is desired, please add '-U 11211' to /etc/memcached.conf and restart the memcached service. References: Package Information: |
Original Source
Url : http://www.ubuntu.com/usn/USN-3588-1 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2018-10-09 | Memcached DDoS attempt RuleID : 47726 - Revision : 1 - Type : SERVER-OTHER |
2018-10-09 | Memcached DDoS attempt RuleID : 47725 - Revision : 1 - Type : SERVER-OTHER |
2018-10-09 | Memcached DDoS attempt RuleID : 47724 - Revision : 1 - Type : SERVER-OTHER |
2018-04-12 | Memcached DDoS reflective attempt RuleID : 45942 - Revision : 1 - Type : SERVER-OTHER |
2018-04-12 | Memcached replaceq opcode request heap buffer overflow attempt RuleID : 45940 - Revision : 1 - Type : SERVER-OTHER |
2018-04-12 | Memcached replace opcode request heap buffer overflow attempt RuleID : 45939 - Revision : 1 - Type : SERVER-OTHER |
2018-04-12 | Memcached addq opcode request heap buffer overflow attempt RuleID : 45938 - Revision : 1 - Type : SERVER-OTHER |
2018-04-12 | Memcached add opcode request heap buffer overflow attempt RuleID : 45937 - Revision : 1 - Type : SERVER-OTHER |
2018-04-12 | Memcached setq opcode request heap buffer overflow attempt RuleID : 45936 - Revision : 1 - Type : SERVER-OTHER |
2018-04-12 | Memcached set opcode request heap buffer overflow attempt RuleID : 45935 - Revision : 1 - Type : SERVER-OTHER |
2016-10-18 | Memcached replaceq opcode request heap buffer overflow attempt RuleID : 40481 - Revision : 4 - Type : SERVER-OTHER |
2016-10-18 | Memcached replace opcode request heap buffer overflow attempt RuleID : 40480 - Revision : 4 - Type : SERVER-OTHER |
2016-10-18 | Memcached addq opcode request heap buffer overflow attempt RuleID : 40479 - Revision : 4 - Type : SERVER-OTHER |
2016-10-18 | Memcached add opcode request heap buffer overflow attempt RuleID : 40478 - Revision : 4 - Type : SERVER-OTHER |
2016-10-18 | Memcached setq opcode request heap buffer overflow attempt RuleID : 40477 - Revision : 4 - Type : SERVER-OTHER |
2016-10-18 | Memcached set opcode request heap buffer overflow attempt RuleID : 40476 - Revision : 4 - Type : SERVER-OTHER |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2018-06-07 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-4218.nasl - Type : ACT_GATHER_INFO |
2018-04-18 | Name : The remote Amazon Linux 2 host is missing a security update. File : al2_ALAS-2018-964.nasl - Type : ACT_GATHER_INFO |
2018-03-09 | Name : The remote Amazon Linux AMI host is missing a security update. File : ala_ALAS-2018-964.nasl - Type : ACT_GATHER_INFO |
2017-07-21 | Name : The remote Debian host is missing a security update. File : debian_DLA-1033.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2018-03-05 21:20:32 |
|