Multiple integer signedness errors in the (1) process_bin_sasl_auth, (2) process_bin_complete_sasl_auth, (3) process_bin_update, and (4) process_bin_append_prepend functions in Memcached 1.4.5 and earlier allow remote attackers to cause a denial of service (crash) via a large body length value in a packet.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Memcached | Memcached | * | 1.4.5 (including) |
Memcached | Memcached | 1.2.7 (including) | 1.2.7 (including) |
Memcached | Memcached | 1.2.8 (including) | 1.2.8 (including) |
Memcached | Memcached | 1.4.0 (including) | 1.4.0 (including) |
Memcached | Memcached | 1.4.1 (including) | 1.4.1 (including) |
Memcached | Memcached | 1.4.2 (including) | 1.4.2 (including) |
Memcached | Memcached | 1.4.3 (including) | 1.4.3 (including) |
Memcached | Memcached | 1.4.4 (including) | 1.4.4 (including) |
Memcached | Ubuntu | devel | * |
Memcached | Ubuntu | hardy | * |
Memcached | Ubuntu | lucid | * |
Memcached | Ubuntu | oneiric | * |
Memcached | Ubuntu | precise | * |
Memcached | Ubuntu | quantal | * |
Memcached | Ubuntu | raring | * |
Memcached | Ubuntu | saucy | * |
Memcached | Ubuntu | upstream | * |