Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2011-4971

Published: 12 December 2013

Multiple integer signedness errors in the (1) process_bin_sasl_auth, (2) process_bin_complete_sasl_auth, (3) process_bin_update, and (4) process_bin_append_prepend functions in Memcached 1.4.5 and earlier allow remote attackers to cause a denial of service (crash) via a large body length value in a packet.

Notes

AuthorNote
seth-arnold
memcached has zero security, ability to connect is already
extremely dangerous; thus low

Priority

Low

Status

Package Release Status
memcached
Launchpad, Ubuntu, Debian
hardy Ignored
(reached end-of-life)
lucid Ignored
(reached end-of-life)
oneiric Ignored
(reached end-of-life)
precise
Released (1.4.13-0ubuntu2.1)
quantal
Released (1.4.14-0ubuntu1.12.10.1)
raring
Released (1.4.14-0ubuntu1.13.04.1)
saucy
Released (1.4.14-0ubuntu4.1)
upstream
Released (1.4.16,1.4.13-0.3)
Patches:
upstream: https://github.com/memcached/memcached/commit/6695ccbc525c36d693aaa3e8337b36aa0c784424