CVE-2018-1000115

Name
CVE-2018-1000115
Description
Memcached version 1.5.5 contains an Insufficient Control of Network Message Volume (Network Amplification, CWE-406) vulnerability in the UDP support of the memcached server that can result in denial of service via network flood (traffic amplification of 1:50,000 has been reported by reliable sources). This attack appear to be exploitable via network connectivity to port 11211 UDP. This vulnerability appears to have been fixed in 1.5.6 due to the disabling of the UDP protocol by default.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Third Party Advisory https://twitter.com/dormando/status/968579781729009664
Third Party Advisory https://github.com/memcached/memcached/wiki/ReleaseNotes156
Issue Tracking https://github.com/memcached/memcached/issues/348
Patch https://github.com/memcached/memcached/commit/dbb7a8af90054bf4ef51f5814ef7ceb17d83d974
Third Party Advisory https://blogs.akamai.com/2018/03/memcached-fueled-13-tbps-attacks.html
Exploit https://www.exploit-db.com/exploits/44264/
Exploit https://www.exploit-db.com/exploits/44265/
Third Party Advisory https://www.synology.com/support/security/Synology_SA_18_07
Third Party Advisory https://usn.ubuntu.com/3588-1/
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:1627
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:1593
Third Party Advisory https://www.debian.org/security/2018/dsa-4218
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:2331
Third Party Advisory https://access.redhat.com/errata/RHBA-2018:2140
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:2857

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:memcached:memcached:1.5.5:*:*:*:*:*:*:* memcached == None == 1.5.5

Vulnerable and fixed packages

Source package Branch Version Maintainer Status