[arch-security] [ASA-201611-1] memcached: arbitrary code execution
Remi Gacogne
rgacogne at archlinux.org
Tue Nov 1 09:27:25 UTC 2016
Arch Linux Security Advisory ASA-201611-1
=========================================
Severity: Critical
Date : 2016-11-01
CVE-ID : CVE-2016-8704 CVE-2016-8705 CVE-2016-8706
Package : memcached
Type : arbitrary code execution
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE
Summary
=======
The package memcached before version 1.4.32-1 is vulnerable to
arbitrary code execution.
Resolution
==========
Upgrade to 1.4.32-1.
# pacman -Syu "memcached>=1.4.32-1"
The problems have been fixed upstream in version 1.4.32.
Workaround
==========
If you do not use the binary protocol at all, a workaround is to start
memcached with "-B ascii" to disable it.
Description
===========
- CVE-2016-8704 (arbitrary code execution)
An integer overflow in the process_bin_append_prepend function which is
responsible for processing multiple commands of Memcached binary
protocol can be abused to cause heap overflow and lead to remote code
execution.
- CVE-2016-8705 (arbitrary code execution)
Multiple integer overflows in process_bin_update function which is
responsible for processing multiple commands of Memcached binary
protocol can be abused to cause heap overflow and lead to remote code
execution.
- CVE-2016-8706 (arbitrary code execution)
An integer overflow in process_bin_sasl_auth function which is
responsible for authentication commands of Memcached binary protocol
can be abused to cause heap overflow and lead to remote code execution.
Impact
======
A remote unauthenticated attacker can execute arbitrary code on the
affected host.
References
==========
http://www.talosintelligence.com/reports/TALOS-2016-0219/
http://www.talosintelligence.com/reports/TALOS-2016-0220/
http://www.talosintelligence.com/reports/TALOS-2016-0221/
http://blog.talosintel.com/2016/10/memcached-vulnerabilities.html
https://github.com/memcached/memcached/wiki/ReleaseNotes1433
https://access.redhat.com/security/cve/CVE-2016-8704
https://access.redhat.com/security/cve/CVE-2016-8705
https://access.redhat.com/security/cve/CVE-2016-8706
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 801 bytes
Desc: OpenPGP digital signature
URL: <https://lists.archlinux.org/pipermail/arch-security/attachments/20161101/e308b609/attachment.asc>
More information about the arch-security
mailing list