memcached before 1.4.17 allows remote attackers to bypass authentication by sending an invalid request with SASL credentials, then sending another request with incorrect SASL credentials.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/64559 | vdb entry |
https://code.google.com/p/memcached/wiki/ReleaseNotes1417 | patch |
http://seclists.org/oss-sec/2013/q4/572 | mailing list |
http://www.ubuntu.com/usn/USN-2080-1 | vendor advisory |
http://www.debian.org/security/2014/dsa-2832 | vendor advisory |
http://secunia.com/advisories/56183 | third party advisory vendor advisory |