Lucene search

K
amazonAmazonALAS-2016-761
HistoryNov 10, 2016 - 6:00 p.m.

Important: memcached

2016-11-1018:00:00
alas.aws.amazon.com
22

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.9 High

EPSS

Percentile

98.8%

Issue Overview:

An integer overflow flaw, leading to a heap-based buffer overflow, was found in the memcached binary protocol. An attacker could create a specially crafted message that would cause the memcached server to crash or, potentially, execute arbitrary code. (CVE-2016-8704, CVE-2016-8705)

An integer overflow flaw, leading to a heap-based buffer overflow, was found in memcached’s parsing of SASL authentication messages. An attacker could create a specially crafted message that would cause the memcached server to crash or, potentially, execute arbitrary code. (CVE-2016-8706)

Affected Packages:

memcached

Issue Correction:
Run yum update memcached to update your system.

New Packages:

i686:  
    memcached-1.4.15-9.13.amzn1.i686  
    memcached-debuginfo-1.4.15-9.13.amzn1.i686  
    memcached-devel-1.4.15-9.13.amzn1.i686  
  
src:  
    memcached-1.4.15-9.13.amzn1.src  
  
x86_64:  
    memcached-1.4.15-9.13.amzn1.x86_64  
    memcached-devel-1.4.15-9.13.amzn1.x86_64  
    memcached-debuginfo-1.4.15-9.13.amzn1.x86_64  

Additional References

Red Hat: CVE-2016-8704, CVE-2016-8705, CVE-2016-8706

Mitre: CVE-2016-8704, CVE-2016-8705, CVE-2016-8706

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.9 High

EPSS

Percentile

98.8%