CVE-2013-7291

Impact:
Low
Public Date:
2013-01-08
Bugzilla:
1052864: CVE-2013-7291 memcached: remote DoS (crash) via a request that triggers "unbounded key print"

The MITRE CVE dictionary describes this issue as:

memcached before 1.4.17, when running in verbose mode, allows remote attackers to cause a denial of service (crash) via a request that triggers an "unbounded key print" during logging, related to an issue that was "quickly grepped out of the source tree," a different vulnerability than CVE-2013-0179 and CVE-2013-7290.

Find out more about CVE-2013-7291 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

The Red Hat Security Response Team has rated this issue as having low security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 1.8
Base Metrics AV:A/AC:H/Au:N/C:N/I:N/A:P
Access Vector Adjacent Network
Access Complexity High
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Affected Packages State

Platform Package State
Red Hat Enterprise Linux 7 memcached Not affected
Red Hat Enterprise Linux 6 memcached Fix deferred

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.