drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in memcached
Name: |
Mehrere Probleme in memcached |
|
ID: |
201406-13 |
|
Distribution: |
Gentoo |
|
Plattformen: |
Keine Angabe |
|
Datum: |
So, 15. Juni 2014, 10:17 |
|
Referenzen: |
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2415
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4971
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0179
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7239
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7290
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7291 |
|
Applikationen: |
memcached |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --UoPLjVSmBcrGjcKdOiG7nK5UCmtJXhq1A Content-Type: text/plain; charset=ISO-8859- Content-Transfer-Encoding: quoted-printable
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201406-13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal Title: memcached: Multiple vulnerabilities Date: June 15, 2014 Bugs: #279386, #452098, #467962, #496506, #498078 ID: 201406-13
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis ========
Multiple vulnerabilities have been found in memcached, allowing remote attackers to execute arbitrary code or cause Denial of Service.
Background ==========
memcached is a high-performance, distributed memory object caching system
Affected packages =================
------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-misc/memcached < 1.4.17 >= 1.4.17
Description ===========
memcached authentication could be bypassed when using SASL due to a flaw related to SASL authentication state. Also several heap-based buffer overflows due to integer conversions when parsing certain length attributes were discovered.
Impact ======
A remote attacker could possibly execute arbitrary code with the privileges of the process, cause a Denial of Service condition or authenticate with invalid SASL credentials, bypassing memcached authentication completely.
Workaround ==========
There is no known workaround at this time.
Resolution ==========
All memcached users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-misc/memcached-1.4.17"
References ==========
[ 1 ] CVE-2009-2415 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-2415 [ 2 ] CVE-2013-7239 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7239 [ 3 ] CVE-2011-4971 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4971 [ 4 ] CVE-2013-0179 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0179 [ 5 ] CVE-2013-7290 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7290 [ 6 ] CVE-2013-7291 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7291
Availability ============
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201406-13.xml
Concerns? =========
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License =======
Copyright 2014 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
--UoPLjVSmBcrGjcKdOiG7nK5UCmtJXhq1A Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0 Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/
iQJ8BAEBCgBmBQJTnO0gXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXQxMzgwNDhGMjg4MzhERTE1NTY2NjA4MkZE MUJBQjZCNTI4REIwMjlDAAoJENG6trUo2wKcpbAP/0IluA9WruaDTNo4dmBySm+n DpslJxtzaqH95NM2dkvd8GMyuzbJUSgMtDhrkXKPuqShV8UwxLru71o2lPzyNWNh 9jqy/OKJwLBPHAA3bP5TYyRVrYOFl0dlPOJvP1BwRsEBx7/yab7bDUZIl6GmDVWF l4/t7J7Oiyda0pCKXLLuClqYwdvzfxkt1dcatQTe+dk0sIjZzKdylc3V1uwZ+n4M 46OWu3WwQ9getWo6qQiDQTsdxPKKcXnP7lj6VY7S0sSr3iqD3V5Arm5QqqHEX3eA dAvZhiVhF2JWGGwRmWm/olko9IQ8h8qH4InBvtJ94kTSRLZOIou7ZirM3TFP5LUo P7UrnqJ6rOpMGY7SA2iQVlLQ/zdpPa/XaUTH3UXwSIhh0YSwIqRwdOveDH4JHjHZ KO/PnYuwPNUZawgm6SiN0By6FFwYKwEtEuOuma0Bd1fFquxElDhRTogK0pvuKirl 7uwJTaQcHuevFac1WuXG2ZU5ob5EEXB8o8jQ+wlqi3XGcBXyw0wjB0jPwzonzRT2 SdK+7lmIKQX6kvVtwStwe2HAIi2Y7PDr74wbyeOuj/Nxjp3lgmOpx861BSbFIhu7 HRbRNU0yvlw6eoTuHHGHzxINNbr1Jrm3kAYiwmYmta3VTlC/OPFGPpDoEtctQfdj 4E5SFubj1UOrBzdEvq8z =Ygdh -----END PGP SIGNATURE-----
--UoPLjVSmBcrGjcKdOiG7nK5UCmtJXhq1A--
|
|
|
|