7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.887 High
EPSS
Percentile
98.7%
Severity: Critical
Date : 2016-11-01
CVE-ID : CVE-2016-8704 CVE-2016-8705 CVE-2016-8706
Package : memcached
Type : arbitrary code execution
Remote : Yes
Link : https://wiki.archlinux.org/index.php/CVE
The package memcached before version 1.4.32-1 is vulnerable to
arbitrary code execution.
Upgrade to 1.4.32-1.
The problems have been fixed upstream in version 1.4.32.
If you do not use the binary protocol at all, a workaround is to start
memcached with “-B ascii” to disable it.
An integer overflow in the process_bin_append_prepend function which is
responsible for processing multiple commands of Memcached binary
protocol can be abused to cause heap overflow and lead to remote code
execution.
Multiple integer overflows in process_bin_update function which is
responsible for processing multiple commands of Memcached binary
protocol can be abused to cause heap overflow and lead to remote code
execution.
An integer overflow in process_bin_sasl_auth function which is
responsible for authentication commands of Memcached binary protocol
can be abused to cause heap overflow and lead to remote code execution.
A remote unauthenticated attacker can execute arbitrary code on the
affected host.
http://www.talosintelligence.com/reports/TALOS-2016-0219/
http://www.talosintelligence.com/reports/TALOS-2016-0220/
http://www.talosintelligence.com/reports/TALOS-2016-0221/
http://blog.talosintel.com/2016/10/memcached-vulnerabilities.html
https://github.com/memcached/memcached/wiki/ReleaseNotes1433
https://access.redhat.com/security/cve/CVE-2016-8704
https://access.redhat.com/security/cve/CVE-2016-8705
https://access.redhat.com/security/cve/CVE-2016-8706
blog.talosintel.com/2016/10/memcached-vulnerabilities.html
www.talosintelligence.com/reports/TALOS-2016-0219/
www.talosintelligence.com/reports/TALOS-2016-0220/
www.talosintelligence.com/reports/TALOS-2016-0221/
access.redhat.com/security/cve/CVE-2016-8704
access.redhat.com/security/cve/CVE-2016-8705
access.redhat.com/security/cve/CVE-2016-8706
github.com/memcached/memcached/wiki/ReleaseNotes1433
wiki.archlinux.org/index.php/CVE
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
0.887 High
EPSS
Percentile
98.7%