memcached 1.5.5

CPE Details

memcached 1.5.5
1.5.5
2019-06-21
15h44 +00:00
2019-06-21
15h44 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:memcached:memcached:1.5.5:*:*:*:*:*:*:*

Informations

Vendor

memcached

Product

memcached

Version

1.5.5

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-46852 2023-10-26
22h00 +00:00
In Memcached before 1.6.22, a buffer overflow exists when processing multiget requests in proxy mode, if there are many spaces after the "get" substring.
7.5
High
CVE-2023-46853 2023-10-26
22h00 +00:00
In Memcached before 1.6.22, an off-by-one error exists when processing proxy requests in proxy mode, if \n is used instead of \r\n.
9.8
Critical
CVE-2019-11596 2019-04-29
12h46 +00:00
In memcached before 1.5.14, a NULL pointer dereference was found in the "lru mode" and "lru temp_ttl" commands. This causes a denial of service when parsing crafted lru command messages in process_lru_command in memcached.c.
7.5
High
CVE-2018-1000115 2018-03-05
13h00 +00:00
Memcached version 1.5.5 contains an Insufficient Control of Network Message Volume (Network Amplification, CWE-406) vulnerability in the UDP support of the memcached server that can result in denial of service via network flood (traffic amplification of 1:50,000 has been reported by reliable sources). This attack appear to be exploitable via network connectivity to port 11211 UDP. This vulnerability appears to have been fixed in 1.5.6 due to the disabling of the UDP protocol by default.
7.5
High