CVE-2017-9951
Published: 17 July 2017
The try_read_command function in memcached.c in memcached before 1.4.39 allows remote attackers to cause a denial of service (segmentation fault) via a request to add/set a key, which makes a comparison between signed and unsigned int and triggers a heap-based buffer over-read. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8705.
From the Ubuntu security team
Daniel Shapira discovered an integer overflow issue in Memcached. A remote attacker could use this to cause a denial of service (daemon crash).
Priority
CVSS 3 base score: 7.5
Status
Package | Release | Status |
---|---|---|
memcached Launchpad, Ubuntu, Debian |
Upstream |
Released
(1.4.39)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Not vulnerable
(1.5.4-1ubuntu1)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(1.4.25-2ubuntu1.3)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was released [1.4.14-0ubuntu9.2])
|
|
Patches: Upstream: https://github.com/memcached/memcached/commit/328629445c71e6c17074f6e9e0e3ef585b58f167 |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9951
- https://www.twistlock.com/2017/07/13/cve-2017-9951-heap-overflow-memcached-server-1-4-38-twistlock-vulnerability-report/
- https://github.com/memcached/memcached/wiki/ReleaseNotes1439
- https://groups.google.com/forum/message/raw?msg=memcached/ubGWrkmrr4E/nrm1SeVJAQAJ
- https://usn.ubuntu.com/usn/usn-3588-1
- NVD
- Launchpad
- Debian