memcached 1.5.5

CPE Details

memcached 1.5.5
1.5.5
2019-06-21
15h44 +00:00
2019-06-21
15h44 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:memcached:memcached:1.5.5:*:*:*:*:*:*:*

Informations

Vendor

memcached

Product

memcached

Version

1.5.5

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2023-46852 2023-10-26 22h00 +00:00 In Memcached before 1.6.22, a buffer overflow exists when processing multiget requests in proxy mode, if there are many spaces after the "get" substring.
7.5
Haute
CVE-2023-46853 2023-10-26 22h00 +00:00 In Memcached before 1.6.22, an off-by-one error exists when processing proxy requests in proxy mode, if \n is used instead of \r\n.
9.8
Critique
CVE-2019-11596 2019-04-29 12h46 +00:00 In memcached before 1.5.14, a NULL pointer dereference was found in the "lru mode" and "lru temp_ttl" commands. This causes a denial of service when parsing crafted lru command messages in process_lru_command in memcached.c.
7.5
Haute
CVE-2018-1000115 2018-03-05 13h00 +00:00 Memcached version 1.5.5 contains an Insufficient Control of Network Message Volume (Network Amplification, CWE-406) vulnerability in the UDP support of the memcached server that can result in denial of service via network flood (traffic amplification of 1:50,000 has been reported by reliable sources). This attack appear to be exploitable via network connectivity to port 11211 UDP. This vulnerability appears to have been fixed in 1.5.6 due to the disabling of the UDP protocol by default.
7.5
Haute