CVE-2011-4971

Publication date 12 December 2013

Last updated 24 July 2024


Ubuntu priority

Multiple integer signedness errors in the (1) process_bin_sasl_auth, (2) process_bin_complete_sasl_auth, (3) process_bin_update, and (4) process_bin_append_prepend functions in Memcached 1.4.5 and earlier allow remote attackers to cause a denial of service (crash) via a large body length value in a packet.

Read the notes from the security team

Status

Package Ubuntu Release Status
memcached 13.10 saucy
Fixed 1.4.14-0ubuntu4.1
13.04 raring
Fixed 1.4.14-0ubuntu1.13.04.1
12.10 quantal
Fixed 1.4.14-0ubuntu1.12.10.1
12.04 LTS precise
Fixed 1.4.13-0ubuntu2.1
11.10 oneiric Ignored end of life
10.04 LTS lucid Ignored end of life
8.04 LTS hardy Ignored end of life

Notes


seth-arnold

memcached has zero security, ability to connect is already extremely dangerous; thus low

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
memcached

References

Related Ubuntu Security Notices (USN)

    • USN-2080-1
    • Memcached vulnerabilities
    • 13 January 2014

Other references