Memcached.UDP.Amplification.Detection
Description
This indicates an attack attempt against an UDP Amplification flaw on the Memcached protocol.
The vulnerability is due to an error in the vulnerable application when handling a series of maliciously crafted requests. An attacker can exploit this to cause a denial of service condition on the affected machine via maliciously crafted requests. The signature detects for 50 suspicious requests within 1 second.
Setting this signature to "Quarantine" is not definitive to who the attacker is as the both the client and the server are victims for this issue.
Affected Products
Memcached prior to 1.5.6
Impact
Denial of Service: Remote attackers can crash vulnerable systems
Recommended Actions
Apply the most recent upgrade or patch from the vendor:
https://github.com/memcached/memcached/wiki/ReleaseNotes156
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2019-06-06 | 14.627 | Severity:low:high |