First published: Mon Mar 05 2018(Updated: )
Daniel Shapira discovered an integer overflow issue in Memcached. A remote attacker could use this to cause a denial of service (daemon crash). (CVE-2017-9951) It was discovered that Memcached listened to UDP by default. A remote attacker could use this as part of a distributed denial of service attack. (CVE-2018-1000115)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/memcached | <1.4.33-1ubuntu3.2 | 1.4.33-1ubuntu3.2 |
=17.10 | ||
All of | ||
ubuntu/memcached | <1.4.25-2ubuntu1.3 | 1.4.25-2ubuntu1.3 |
=16.04 | ||
All of | ||
ubuntu/memcached | <1.4.14-0ubuntu9.2 | 1.4.14-0ubuntu9.2 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability in USN-3588-1 is an integer overflow issue in Memcached.
The vulnerability can be exploited by a remote attacker to cause a denial of service (daemon crash).
Versions 1.4.33-1ubuntu3.2, 1.4.25-2ubuntu1.3, and 1.4.14-0ubuntu9.2 of Memcached are affected.
Ubuntu versions 17.10, 16.04, and 14.04 are affected by the vulnerability.
To fix the vulnerability, update Memcached to a version that includes the necessary security patches.