CVE-2018-1000115
Summary
| CVE | CVE-2018-1000115 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-03-05 14:29:00 UTC |
| Updated | 2021-08-04 17:15:00 UTC |
| Description | Memcached version 1.5.5 contains an Insufficient Control of Network Message Volume (Network Amplification, CWE-406) vulnerability in the UDP support of the memcached server that can result in denial of service via network flood (traffic amplification of 1:50,000 has been reported by reliable sources). This attack appear to be exploitable via network connectivity to port 11211 UDP. This vulnerability appears to have been fixed in 1.5.6 due to the disabling of the UDP protocol by default. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| ReleaseNotes156 · memcached/memcached Wiki · GitHub |
MISC |
github.com |
Third Party Advisory |
| Memcached-fueled 1.3 Tbps attacks - The Akamai Blog |
MISC |
blogs.akamai.com |
Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| UDP Amplification Attacks, result of Memcached UDP port 11211 · Issue #348 · memcached/memcached · GitHub |
MISC |
github.com |
Issue Tracking, Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| Memcached 1.5.5 - 'Memcrashed' Insufficient Control Network Message Volume Denial of Service (1) - Linux dos Exploit |
EXPLOIT-DB |
www.exploit-db.com |
Exploit, Third Party Advisory, VDB Entry |
| Synology Inc. |
CONFIRM |
www.synology.com |
Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| dormando on Twitter: "For what it's worth, if you're getting attacked by memcached's, it's pretty easy to disable them since the source won't be spoofed. They may accept "shutdown\r\n", but also running "flush_all\r\n" in a loop will prevent amplification." |
MISC |
twitter.com |
Third Party Advisory |
| Debian -- Security Information -- DSA-4218-1 memcached |
DEBIAN |
www.debian.org |
Third Party Advisory |
| Memcached 1.5.5 - 'Memcrashed ' Insufficient Control of Network Message Volume Denial of Service With Shodan API - Linux dos Exploit |
EXPLOIT-DB |
www.exploit-db.com |
Exploit, Third Party Advisory, VDB Entry |
| USN-3588-1: Memcached vulnerabilities | Ubuntu security notices | Ubuntu |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| disable UDP port by default · memcached/memcached@dbb7a8a · GitHub |
MISC |
github.com |
Patch, Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 296090 Oracle Solaris 11.4 Support Repository Update (SRU) 5.1.3 Missing (CPUJAN2019)
- 671070 EulerOS Security Update for memcached (EulerOS-SA-2019-2631)
- 671098 EulerOS Security Update for memcached (EulerOS-SA-2019-2213)