SB2015092634 - Debian update for memcached



SB2015092634 - Debian update for memcached

Published: September 26, 2015

Security Bulletin ID SB2015092634
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 67% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Buffer access with incorrect length value (CVE-ID: CVE-2011-4971)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists in the (1) process_bin_sasl_auth, (2) process_bin_complete_sasl_auth, (3) process_bin_update, and (4) process_bin_append_prepend functions due to a large body length value in a packet. A remote attacker can trigger memory corruption and cause the service to crash.

2) Improper authentication (CVE-ID: CVE-2013-7239)

The vulnerability allows a remote attacker to bypass authentication on the target system.

The weakness exists due to allowing wrong credentials access. A remote attacker can send an invalid request with SASL credentials, then send another request with incorrect SASL credentials and bypass authentication.

3) Buffer over-read (CVE-ID: CVE-2013-0179)

The vulnerability allows a remote attacker to cause DoS condition on the target system.

The weakness exists due to boundary error in the process_bin_delete function when running in verbose mode. A remote attacker can cause the service to crash via a request to delete a key, which does not account for the lack of a null terminator in the key and triggers buffer over-read when printing to stderr.


Remediation

Install update from vendor's website.