Filtered by vendor Memcached
Subscriptions
Total
19 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2023-46853 | 1 Memcached | 1 Memcached | 2024-11-21 | 9.8 Critical |
In Memcached before 1.6.22, an off-by-one error exists when processing proxy requests in proxy mode, if \n is used instead of \r\n. | ||||
CVE-2023-46852 | 1 Memcached | 1 Memcached | 2024-11-21 | 7.5 High |
In Memcached before 1.6.22, a buffer overflow exists when processing multiget requests in proxy mode, if there are many spaces after the "get" substring. | ||||
CVE-2022-48571 | 1 Memcached | 1 Memcached | 2024-11-21 | 7.5 High |
memcached 1.6.7 allows a Denial of Service via multi-packet uploads in UDP. | ||||
CVE-2021-37519 | 1 Memcached | 1 Memcached | 2024-11-21 | 5.5 Medium |
Buffer Overflow vulnerability in authfile.c memcached 1.6.9 allows attackers to cause a denial of service via crafted authenticattion file. | ||||
CVE-2020-22570 | 1 Memcached | 1 Memcached | 2024-11-21 | 7.5 High |
Memcached 1.6.0 before 1.6.3 allows remote attackers to cause a denial of service (daemon crash) via a crafted meta command. | ||||
CVE-2020-10931 | 1 Memcached | 1 Memcached | 2024-11-21 | 7.5 High |
Memcached 1.6.x before 1.6.2 allows remote attackers to cause a denial of service (daemon crash) via a crafted binary protocol header to try_read_command_binary in memcached.c. | ||||
CVE-2019-15026 | 1 Memcached | 1 Memcached | 2024-11-21 | N/A |
memcached 1.5.16, when UNIX sockets are used, has a stack-based buffer over-read in conn_to_str in memcached.c. | ||||
CVE-2019-11596 | 3 Canonical, Memcached, Redhat | 4 Ubuntu Linux, Memcached, Enterprise Linux and 1 more | 2024-11-21 | N/A |
In memcached before 1.5.14, a NULL pointer dereference was found in the "lru mode" and "lru temp_ttl" commands. This causes a denial of service when parsing crafted lru command messages in process_lru_command in memcached.c. | ||||
CVE-2018-1000127 | 4 Canonical, Debian, Memcached and 1 more | 4 Ubuntu Linux, Debian Linux, Memcached and 1 more | 2024-11-21 | N/A |
memcached version prior to 1.4.37 contains an Integer Overflow vulnerability in items.c:item_free() that can result in data corruption and deadlocks due to items existing in hash table being reused from free list. This attack appear to be exploitable via network connectivity to the memcached service. This vulnerability appears to have been fixed in 1.4.37 and later. | ||||
CVE-2018-1000115 | 4 Canonical, Debian, Memcached and 1 more | 5 Ubuntu Linux, Debian Linux, Memcached and 2 more | 2024-11-21 | N/A |
Memcached version 1.5.5 contains an Insufficient Control of Network Message Volume (Network Amplification, CWE-406) vulnerability in the UDP support of the memcached server that can result in denial of service via network flood (traffic amplification of 1:50,000 has been reported by reliable sources). This attack appear to be exploitable via network connectivity to port 11211 UDP. This vulnerability appears to have been fixed in 1.5.6 due to the disabling of the UDP protocol by default. | ||||
CVE-2017-9951 | 1 Memcached | 1 Memcached | 2024-11-21 | N/A |
The try_read_command function in memcached.c in memcached before 1.4.39 allows remote attackers to cause a denial of service (segmentation fault) via a request to add/set a key, which makes a comparison between signed and unsigned int and triggers a heap-based buffer over-read. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8705. | ||||
CVE-2016-8706 | 2 Memcached, Redhat | 2 Memcached, Enterprise Linux | 2024-11-21 | N/A |
An integer overflow in process_bin_sasl_auth function in Memcached, which is responsible for authentication commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution. | ||||
CVE-2016-8705 | 2 Memcached, Redhat | 3 Memcached, Enterprise Linux, Mobile Application Platform | 2024-11-21 | N/A |
Multiple integer overflows in process_bin_update function in Memcached, which is responsible for processing multiple commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution. | ||||
CVE-2016-8704 | 2 Memcached, Redhat | 3 Memcached, Enterprise Linux, Mobile Application Platform | 2024-11-21 | N/A |
An integer overflow in the process_bin_append_prepend function in Memcached, which is responsible for processing multiple commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution. | ||||
CVE-2013-7291 | 1 Memcached | 1 Memcached | 2024-11-21 | N/A |
memcached before 1.4.17, when running in verbose mode, allows remote attackers to cause a denial of service (crash) via a request that triggers an "unbounded key print" during logging, related to an issue that was "quickly grepped out of the source tree," a different vulnerability than CVE-2013-0179 and CVE-2013-7290. | ||||
CVE-2013-7290 | 1 Memcached | 1 Memcached | 2024-11-21 | N/A |
The do_item_get function in items.c in memcached 1.4.4 and other versions before 1.4.17, when running in verbose mode, allows remote attackers to cause a denial of service (segmentation fault) via a request to delete a key, which does not account for the lack of a null terminator in the key and triggers a buffer over-read when printing to stderr, a different vulnerability than CVE-2013-0179. | ||||
CVE-2013-7239 | 1 Memcached | 1 Memcached | 2024-11-21 | N/A |
memcached before 1.4.17 allows remote attackers to bypass authentication by sending an invalid request with SASL credentials, then sending another request with incorrect SASL credentials. | ||||
CVE-2013-0179 | 1 Memcached | 1 Memcached | 2024-11-21 | N/A |
The process_bin_delete function in memcached.c in memcached 1.4.4 and other versions before 1.4.17, when running in verbose mode, allows remote attackers to cause a denial of service (segmentation fault) via a request to delete a key, which does not account for the lack of a null terminator in the key and triggers a buffer over-read when printing to stderr. | ||||
CVE-2011-4971 | 1 Memcached | 1 Memcached | 2024-11-21 | N/A |
Multiple integer signedness errors in the (1) process_bin_sasl_auth, (2) process_bin_complete_sasl_auth, (3) process_bin_update, and (4) process_bin_append_prepend functions in Memcached 1.4.5 and earlier allow remote attackers to cause a denial of service (crash) via a large body length value in a packet. |
Page 1 of 1.