ALT-PU-2016-2235-1
Closed vulnerabilities
Modified: 2021-03-23
BDU:2015-09681
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2025-04-11
CVE-2013-0179
The process_bin_delete function in memcached.c in memcached 1.4.4 and other versions before 1.4.17, when running in verbose mode, allows remote attackers to cause a denial of service (segmentation fault) via a request to delete a key, which does not account for the lack of a null terminator in the key and triggers a buffer over-read when printing to stderr.
- http://secunia.com/advisories/56183
- http://www.openwall.com/lists/oss-security/2013/01/14/4
- http://www.openwall.com/lists/oss-security/2013/01/14/6
- http://www.securityfocus.com/bid/64978
- http://www.ubuntu.com/usn/USN-2080-1
- https://bugzilla.redhat.com/show_bug.cgi?id=895054
- https://code.google.com/p/memcached/issues/attachmentText?id=306&aid=3060004000&name=0001-Fix-buffer-overrun-when-logging-key-to-delete-in-bin.patch&token=3GEzHThBL5cxmUrsYANkW03RrNY%3A1358179503096
- https://code.google.com/p/memcached/issues/detail?id=306
- https://code.google.com/p/memcached/wiki/ReleaseNotes1417
- http://secunia.com/advisories/56183
- http://www.openwall.com/lists/oss-security/2013/01/14/4
- http://www.openwall.com/lists/oss-security/2013/01/14/6
- http://www.securityfocus.com/bid/64978
- http://www.ubuntu.com/usn/USN-2080-1
- https://bugzilla.redhat.com/show_bug.cgi?id=895054
- https://code.google.com/p/memcached/issues/attachmentText?id=306&aid=3060004000&name=0001-Fix-buffer-overrun-when-logging-key-to-delete-in-bin.patch&token=3GEzHThBL5cxmUrsYANkW03RrNY%3A1358179503096
- https://code.google.com/p/memcached/issues/detail?id=306
- https://code.google.com/p/memcached/wiki/ReleaseNotes1417
Modified: 2025-04-11
CVE-2013-7239
memcached before 1.4.17 allows remote attackers to bypass authentication by sending an invalid request with SASL credentials, then sending another request with incorrect SASL credentials.
- http://seclists.org/oss-sec/2013/q4/572
- http://secunia.com/advisories/56183
- http://www.debian.org/security/2014/dsa-2832
- http://www.securityfocus.com/bid/64559
- http://www.ubuntu.com/usn/USN-2080-1
- https://code.google.com/p/memcached/wiki/ReleaseNotes1417
- http://seclists.org/oss-sec/2013/q4/572
- http://secunia.com/advisories/56183
- http://www.debian.org/security/2014/dsa-2832
- http://www.securityfocus.com/bid/64559
- http://www.ubuntu.com/usn/USN-2080-1
- https://code.google.com/p/memcached/wiki/ReleaseNotes1417
Modified: 2025-04-11
CVE-2013-7290
The do_item_get function in items.c in memcached 1.4.4 and other versions before 1.4.17, when running in verbose mode, allows remote attackers to cause a denial of service (segmentation fault) via a request to delete a key, which does not account for the lack of a null terminator in the key and triggers a buffer over-read when printing to stderr, a different vulnerability than CVE-2013-0179.
- http://www.securityfocus.com/bid/64988
- https://code.google.com/p/memcached/issues/detail?id=306
- https://code.google.com/p/memcached/wiki/ReleaseNotes1417
- http://www.securityfocus.com/bid/64988
- https://code.google.com/p/memcached/issues/detail?id=306
- https://code.google.com/p/memcached/wiki/ReleaseNotes1417
Modified: 2025-04-11
CVE-2013-7291
memcached before 1.4.17, when running in verbose mode, allows remote attackers to cause a denial of service (crash) via a request that triggers an "unbounded key print" during logging, related to an issue that was "quickly grepped out of the source tree," a different vulnerability than CVE-2013-0179 and CVE-2013-7290.
- http://www.securityfocus.com/bid/64989
- https://code.google.com/p/memcached/issues/detail?id=306
- https://code.google.com/p/memcached/wiki/ReleaseNotes1417
- http://www.securityfocus.com/bid/64989
- https://code.google.com/p/memcached/issues/detail?id=306
- https://code.google.com/p/memcached/wiki/ReleaseNotes1417
Modified: 2025-04-20
CVE-2016-8704
An integer overflow in the process_bin_append_prepend function in Memcached, which is responsible for processing multiple commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.
- http://rhn.redhat.com/errata/RHSA-2016-2819.html
- http://rhn.redhat.com/errata/RHSA-2016-2820.html
- http://www.debian.org/security/2016/dsa-3704
- http://www.securityfocus.com/bid/94083
- http://www.securitytracker.com/id/1037333
- http://www.talosintelligence.com/reports/TALOS-2016-0219/
- https://access.redhat.com/errata/RHSA-2017:0059
- https://security.gentoo.org/glsa/201701-12
- http://rhn.redhat.com/errata/RHSA-2016-2819.html
- http://rhn.redhat.com/errata/RHSA-2016-2820.html
- http://www.debian.org/security/2016/dsa-3704
- http://www.securityfocus.com/bid/94083
- http://www.securitytracker.com/id/1037333
- http://www.talosintelligence.com/reports/TALOS-2016-0219/
- https://access.redhat.com/errata/RHSA-2017:0059
- https://security.gentoo.org/glsa/201701-12
Modified: 2025-04-20
CVE-2016-8705
Multiple integer overflows in process_bin_update function in Memcached, which is responsible for processing multiple commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.
- http://rhn.redhat.com/errata/RHSA-2016-2819.html
- http://rhn.redhat.com/errata/RHSA-2016-2820.html
- http://www.debian.org/security/2016/dsa-3704
- http://www.securityfocus.com/bid/94083
- http://www.securitytracker.com/id/1037333
- http://www.talosintelligence.com/reports/TALOS-2016-0220/
- https://access.redhat.com/errata/RHSA-2017:0059
- https://security.gentoo.org/glsa/201701-12
- http://rhn.redhat.com/errata/RHSA-2016-2819.html
- http://rhn.redhat.com/errata/RHSA-2016-2820.html
- http://www.debian.org/security/2016/dsa-3704
- http://www.securityfocus.com/bid/94083
- http://www.securitytracker.com/id/1037333
- http://www.talosintelligence.com/reports/TALOS-2016-0220/
- https://access.redhat.com/errata/RHSA-2017:0059
- https://security.gentoo.org/glsa/201701-12
Modified: 2025-04-20
CVE-2016-8706
An integer overflow in process_bin_sasl_auth function in Memcached, which is responsible for authentication commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.
- http://rhn.redhat.com/errata/RHSA-2016-2819.html
- http://www.debian.org/security/2016/dsa-3704
- http://www.securityfocus.com/bid/94083
- http://www.securitytracker.com/id/1037333
- http://www.talosintelligence.com/reports/TALOS-2016-0221/
- https://security.gentoo.org/glsa/201701-12
- http://rhn.redhat.com/errata/RHSA-2016-2819.html
- http://www.debian.org/security/2016/dsa-3704
- http://www.securityfocus.com/bid/94083
- http://www.securitytracker.com/id/1037333
- http://www.talosintelligence.com/reports/TALOS-2016-0221/
- https://security.gentoo.org/glsa/201701-12