SB2015092634 - Debian update for memcached
Published: September 26, 2015
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Buffer access with incorrect length value (CVE-ID: CVE-2011-4971)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists in the (1) process_bin_sasl_auth, (2) process_bin_complete_sasl_auth, (3) process_bin_update, and (4) process_bin_append_prepend functions due to a large body length value in a packet. A remote attacker can trigger memory corruption and cause the service to crash.
2) Improper authentication (CVE-ID: CVE-2013-7239)
The vulnerability allows a remote attacker to bypass authentication on the target system.The weakness exists due to allowing wrong credentials access. A remote attacker can send an invalid request with SASL credentials, then send another request with incorrect SASL credentials and bypass authentication.
3) Buffer over-read (CVE-ID: CVE-2013-0179)
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists due to boundary error in the process_bin_delete function when running in verbose mode. A remote attacker can cause the service to crash via a request to delete a key, which does not account for the lack of a null terminator in the key and triggers buffer over-read when printing to stderr.
Remediation
Install update from vendor's website.