memcached version prior to 1.4.37 contains an Integer Overflow vulnerability in items.c:item_free() that can result in data corruption and deadlocks due to items existing in hash table being reused from free list. This attack appear to be exploitable via network connectivity to the memcached service. This vulnerability appears to have been fixed in 1.4.37 and later.
References
Link | Resource |
---|---|
https://github.com/memcached/memcached/wiki/ReleaseNotes1437 | Release Notes Third Party Advisory |
https://github.com/memcached/memcached/issues/271 | Third Party Advisory |
https://github.com/memcached/memcached/commit/a8c4a82787b8b6c256d61bd5c42fb7f92d1bae00 | Patch Third Party Advisory |
https://usn.ubuntu.com/3601-1/ | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2018/03/msg00031.html | Mailing List Third Party Advisory |
https://www.debian.org/security/2018/dsa-4218 | Third Party Advisory |
https://access.redhat.com/errata/RHSA-2018:2290 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2018-03-13 14:29
Updated : 2020-08-24 10:37
NVD link : CVE-2018-1000127
Mitre link : CVE-2018-1000127
JSON object : View
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
redhat
- openstack
memcached
- memcached