First published: Wed Sep 29 2021(Updated: )
Couchbase Server 6.5.x, 6.6.0 through 6.6.2, and 7.0.0, has a Buffer Overflow. A specially crafted network packet sent from an attacker can crash memcached.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Couchbase Couchbase Server | >=4.5.0<=5.5.6 | |
Couchbase Couchbase Server | >=6.0.0<=6.0.5 | |
Couchbase Couchbase Server | >=6.5.0<=6.5.2 | |
Couchbase Couchbase Server | >=6.6.0<=6.6.2 | |
Couchbase Couchbase Server | =7.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-35945 is a vulnerability in Couchbase Server versions 6.5.x, 6.6.0 through 6.6.2, and 7.0.0, which allows an attacker to crash memcached by sending a specially crafted network packet.
CVE-2021-35945 has a severity rating of 7.5 (high).
Couchbase Server versions 6.5.x, 6.6.0 through 6.6.2, and 7.0.0 are affected by CVE-2021-35945.
To fix CVE-2021-35945, it is recommended to upgrade Couchbase Server to a version that is not affected by the vulnerability. Refer to the official Couchbase Server documentation and release notes for more information.
Yes, you can refer to the official Couchbase Server release notes and alerts for more information on CVE-2021-35945.