memcached before 1.4.17 allows remote attackers to bypass authentication by sending an invalid request with SASL credentials, then sending another request with incorrect SASL credentials.
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Primary | 2.0 | 4.8 | MEDIUM | AV:A/AC:L/Au:N/C:P/I:P/A:N |
| Hyperlink | Source | Resource |
|---|---|---|
| http://seclists.org/oss-sec/2013/q4/572 | security@debian.org | N/A |
| http://secunia.com/advisories/56183 | security@debian.org | Vendor Advisory |
| http://www.debian.org/security/2014/dsa-2832 | security@debian.org | N/A |
| http://www.securityfocus.com/bid/64559 | security@debian.org | N/A |
| http://www.ubuntu.com/usn/USN-2080-1 | security@debian.org | N/A |
| https://code.google.com/p/memcached/wiki/ReleaseNotes1417 | security@debian.org | Patch |
| http://seclists.org/oss-sec/2013/q4/572 | af854a3a-2127-422b-91ae-364da2661108 | N/A |
| http://secunia.com/advisories/56183 | af854a3a-2127-422b-91ae-364da2661108 | Vendor Advisory |
| http://www.debian.org/security/2014/dsa-2832 | af854a3a-2127-422b-91ae-364da2661108 | N/A |
| http://www.securityfocus.com/bid/64559 | af854a3a-2127-422b-91ae-364da2661108 | N/A |
| http://www.ubuntu.com/usn/USN-2080-1 | af854a3a-2127-422b-91ae-364da2661108 | N/A |
| https://code.google.com/p/memcached/wiki/ReleaseNotes1417 | af854a3a-2127-422b-91ae-364da2661108 | Patch |