First published: Thu Dec 12 2013(Updated: )
Multiple integer signedness errors in the (1) process_bin_sasl_auth, (2) process_bin_complete_sasl_auth, (3) process_bin_update, and (4) process_bin_append_prepend functions in Memcached 1.4.5 and earlier allow remote attackers to cause a denial of service (crash) via a large body length value in a packet.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Memcached Memcached | =1.4.2 | |
Memcached Memcached | =1.2.7 | |
Memcached Memcached | =1.4.4 | |
Memcached Memcached | =1.4.3 | |
Memcached Memcached | <=1.4.5 | |
Memcached Memcached | =1.4.0 | |
Memcached Memcached | =1.2.8 | |
Memcached Memcached | =1.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.