memcached 1.4.34

CPE Details

memcached 1.4.34
1.4.34
2019-06-21
15h44 +00:00
2019-06-21
15h44 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:memcached:memcached:1.4.34:*:*:*:*:*:*:*

Informations

Vendor

memcached

Product

memcached

Version

1.4.34

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-46852 2023-10-26 22h00 +00:00 In Memcached before 1.6.22, a buffer overflow exists when processing multiget requests in proxy mode, if there are many spaces after the "get" substring.
7.5
High
CVE-2023-46853 2023-10-26 22h00 +00:00 In Memcached before 1.6.22, an off-by-one error exists when processing proxy requests in proxy mode, if \n is used instead of \r\n.
9.8
Critical
CVE-2019-11596 2019-04-29 12h46 +00:00 In memcached before 1.5.14, a NULL pointer dereference was found in the "lru mode" and "lru temp_ttl" commands. This causes a denial of service when parsing crafted lru command messages in process_lru_command in memcached.c.
7.5
High
CVE-2018-1000127 2018-03-13 20h00 +00:00 memcached version prior to 1.4.37 contains an Integer Overflow vulnerability in items.c:item_free() that can result in data corruption and deadlocks due to items existing in hash table being reused from free list. This attack appear to be exploitable via network connectivity to the memcached service. This vulnerability appears to have been fixed in 1.4.37 and later.
7.5
High
CVE-2017-9951 2017-07-17 04h00 +00:00 The try_read_command function in memcached.c in memcached before 1.4.39 allows remote attackers to cause a denial of service (segmentation fault) via a request to add/set a key, which makes a comparison between signed and unsigned int and triggers a heap-based buffer over-read. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8705.
7.5
High