First published: Mon Jul 17 2017(Updated: )
The try_read_command function in memcached.c in memcached before 1.4.39 allows remote attackers to cause a denial of service (segmentation fault) via a request to add/set a key, which makes a comparison between signed and unsigned int and triggers a heap-based buffer over-read. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8705.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/memcached | <=1.4.21-1.1+deb8u1<=1.4.21-1.1<=1.4.33-1 | 1.5.0-1 1.4.33-1+deb9u1 1.4.21-1.1+deb8u2 |
Memcached Memcached | <=1.4.38 | |
ubuntu/memcached | <1.4.33-1ubuntu3.2 | 1.4.33-1ubuntu3.2 |
ubuntu/memcached | <1.4.14-0ubuntu9.2 | 1.4.14-0ubuntu9.2 |
ubuntu/memcached | <1.4.39 | 1.4.39 |
ubuntu/memcached | <1.4.25-2ubuntu1.3 | 1.4.25-2ubuntu1.3 |
debian/memcached | 1.6.9+dfsg-1 1.6.18-1 1.6.29-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2017-9951.
The severity of CVE-2017-9951 is high with a severity value of 7.5.
CVE-2017-9951 allows remote attackers to cause a denial of service by triggering a heap-based buffer over-read through a request to add/set a key.
Versions before 1.4.39 of memcached are affected by CVE-2017-9951.
To fix CVE-2017-9951, update memcached to version 1.4.39 or later.