CVE-2011-4971
Publication date 12 December 2013
Last updated 24 July 2024
Ubuntu priority
Multiple integer signedness errors in the (1) process_bin_sasl_auth, (2) process_bin_complete_sasl_auth, (3) process_bin_update, and (4) process_bin_append_prepend functions in Memcached 1.4.5 and earlier allow remote attackers to cause a denial of service (crash) via a large body length value in a packet.
Status
Package | Ubuntu Release | Status |
---|---|---|
memcached | 13.10 saucy |
Fixed 1.4.14-0ubuntu4.1
|
13.04 raring |
Fixed 1.4.14-0ubuntu1.13.04.1
|
|
12.10 quantal |
Fixed 1.4.14-0ubuntu1.12.10.1
|
|
12.04 LTS precise |
Fixed 1.4.13-0ubuntu2.1
|
|
11.10 oneiric | Ignored end of life | |
10.04 LTS lucid | Ignored end of life | |
8.04 LTS hardy | Ignored end of life |
Notes
seth-arnold
memcached has zero security, ability to connect is already extremely dangerous; thus low
References
Related Ubuntu Security Notices (USN)
- USN-2080-1
- Memcached vulnerabilities
- 13 January 2014