Memcached.try_read_command_binary.Stack.Buffer.Overflow
Description
This indicates an attack attempt to exploit a Buffer Overflow Vulnerability in Memcached.
This vulnerability is due to a lack of bounds checking when processing binary commands. A remote unauthenticated attacker can exploit this vulnerability by sending a specially crafted packet to memcached process. This can lead to a buffer overflow and possible code execution in the context of the user.
Affected Products
Memcached Project Memcached 1.6.0
Memcached Project Memcached 1.6.1
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the most recent upgrade or patch from the vendor.
https://github.com/memcached/memcached/wiki/ReleaseNotes162
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2020-07-08 | 15.881 | Default_action:pass:drop |
2020-05-06 | 15.838 | |
2020-05-06 | 15.837 | |
2020-05-06 | 15.836 |