Multiple integer signedness errors in the (1) process_bin_sasl_auth, (2) process_bin_complete_sasl_auth, (3) process_bin_update, and (4) process_bin_append_prepend functions in Memcached 1.4.5 and earlier allow remote attackers to cause a denial of service (crash) via a large body length value in a packet.
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
http://insecurety.net/?p=872 | exploit |
http://www.mandriva.com/security/advisories?name=MDVSA-2013:280 | vendor advisory |
https://code.google.com/p/memcached/issues/detail?id=192 | patch exploit |
http://www.ubuntu.com/usn/USN-2080-1 | vendor advisory |
http://www.securityfocus.com/bid/59567 | vdb entry |
https://puppet.com/security/cve/cve-2011-4971 | |
http://www.debian.org/security/2014/dsa-2832 | vendor advisory |
http://secunia.com/advisories/56183 | third party advisory |