CVE-2011-4971

Impact:
Low
Public Date:
2011-05-15
Bugzilla:
957964: CVE-2011-4971 memcached: specially crafted packet segmentation fault

The MITRE CVE dictionary describes this issue as:

Multiple integer signedness errors in the (1) process_bin_sasl_auth, (2) process_bin_complete_sasl_auth, (3) process_bin_update, and (4) process_bin_append_prepend functions in Memcached 1.4.5 and earlier allow remote attackers to cause a denial of service (crash) via a large body length value in a packet.

Find out more about CVE-2011-4971 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue affects the version of memcached as shipped with Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 3.3
Base Metrics AV:A/AC:L/Au:N/C:N/I:N/A:P
Access Vector Adjacent Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 7 memcached Not affected
Red Hat Enterprise Linux 6 memcached Fix deferred

External References

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.