First published: Fri Aug 30 2019(Updated: )
memcached 1.5.16, when UNIX sockets are used, has a stack-based buffer over-read in conn_to_str in memcached.c.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Memcached Memcached | =1.5.16 | |
ubuntu/memcached | <1.5.6-0ubuntu1.2 | 1.5.6-0ubuntu1.2 |
ubuntu/memcached | <1.5.10-0ubuntu1.19.04.2 | 1.5.10-0ubuntu1.19.04.2 |
ubuntu/memcached | <1.4.25-2ubuntu1.5 | 1.4.25-2ubuntu1.5 |
debian/memcached | 1.6.9+dfsg-1 1.6.18-1 1.6.29-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15026 is a vulnerability in memcached 1.5.16 that leads to a stack-based buffer over-read when UNIX sockets are used.
CVE-2019-15026 has a severity level of high with a CVSS score of 7.5.
memcached versions 1.5.16, 1.5.6-0ubuntu1.2, 1.5.10-0ubuntu1.19.04.2, 1.4.25-2ubuntu1.5, 1.6.9+dfsg-1, 1.6.18-1, and 1.6.22-1 are affected by CVE-2019-15026.
To fix CVE-2019-15026, update your memcached installation to version 1.5.6-0ubuntu1.2, 1.5.10-0ubuntu1.19.04.2, 1.4.25-2ubuntu1.5, 1.6.9+dfsg-1, 1.6.18-1, or 1.6.22-1.
You can find more information about CVE-2019-15026 in the references: http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00060.html, https://github.com/memcached/memcached/commit/554b56687a19300a75ec24184746b5512580c819, and https://github.com/memcached/memcached/wiki/ReleaseNotes1517.