First published: Sat Mar 03 2018(Updated: )
memcached supports TCP and UDP servers, when the UDP server is enabled, and the configuration does not specify localhost or 127.0.0.1, and the server does not firewall the memcached port (11211 by default) can be exploited for network traffic amplification attacks by spoofed UDP packets. Please note that by default the firewall on Red Hat Enterprise Linux only allows port 22 (SSH) inbound, so systems with memcached enabled are only affected if a firewall rule is added that allows UDP traffic to connect to memcached (by default on port 11211).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Memcached Memcached | =1.5.5 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Redhat Openstack | =8 | |
Redhat Openstack | =9 | |
Redhat Openstack | =10 | |
Redhat Openstack | =11 | |
Redhat Openstack | =12 | |
redhat/memcached | <1.5.6 | 1.5.6 |
ubuntu/memcached | <1.4.33-1ubuntu3.2 | 1.4.33-1ubuntu3.2 |
ubuntu/memcached | <1.4.14-0ubuntu9.2 | 1.4.14-0ubuntu9.2 |
ubuntu/memcached | <1.5.6 | 1.5.6 |
ubuntu/memcached | <1.4.25-2ubuntu1.3 | 1.4.25-2ubuntu1.3 |
debian/memcached | 1.6.9+dfsg-1 1.6.18-1 1.6.29-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-1000115 is a vulnerability in Memcached version 1.5.5 that allows for network flood denial-of-service attacks.
Memcached version 1.5.5 and lower are affected by CVE-2018-1000115.
CVE-2018-1000115 has a severity rating of 7.5 (High).
To fix CVE-2018-1000115, update Memcached to version 1.5.6 or higher.
You can find more information about CVE-2018-1000115 in the release notes of Memcached version 1.5.6 and the provided references.