7.5
CVSSv3

CVE-2018-1000115

Published: 05/03/2018 Updated: 04/08/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 510
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

Memcached version 1.5.5 contains an Insufficient Control of Network Message Volume (Network Amplification, CWE-406) vulnerability in the UDP support of the memcached server that can result in denial of service via network flood (traffic amplification of 1:50,000 has been reported by reliable sources). This attack appear to be exploitable via network connectivity to port 11211 UDP. This vulnerability appears to have been fixed in 1.5.6 due to the disabling of the UDP protocol by default.

Vulnerable Product Search on Vulmon Subscribe to Product

memcached memcached 1.5.5

canonical ubuntu linux 14.04

canonical ubuntu linux 17.10

canonical ubuntu linux 16.04

debian debian linux 9.0

debian debian linux 8.0

redhat openstack 8

redhat openstack 9

redhat openstack 10

redhat openstack 11

redhat openstack 12

Vendor Advisories

Several security issues were fixed in Memcached ...
Synopsis Moderate: Red Hat OpenStack Platform 8 director security and bug fix update Type/Severity Security Advisory: Moderate Topic An update for instack-undercloud and openstack-tripleo-heat-templates is now available for Red Hat OpenStack Platform 80 (Liberty) directorRed Hat Product Security has rated ...
Synopsis Moderate: Red Hat OpenStack Platform director security update Type/Severity Security Advisory: Moderate Topic An update is now available for Red Hat OpenStack Platform 100 (Newton)Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scorin ...
Synopsis Moderate: Red Hat OpenStack Platform 120 director security and bug fix update Type/Severity Security Advisory: Moderate Topic An update for memcached is now available for Red Hat OpenStack Platform 120 (Pike)Red Hat Product Security has rated this update as having a security impact of Moderate ...
Synopsis Moderate: Red Hat OpenStack Platform director security update Type/Severity Security Advisory: Moderate Topic An update is now available for Red Hat OpenStack Platform 110 (Ocata)Red Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerability Scoring ...
Debian Bug report logs - #868701 memcached: CVE-2017-9951: Heap-based buffer over-read in try_read_command function Package: src:memcached; Maintainer for src:memcached is Guillaume Delacour <gui@iroqwaorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 17 Jul 2017 20:39:02 UTC Severity: important ...
Debian Bug report logs - #894404 memcached: CVE-2018-1000127 Package: memcached; Maintainer for memcached is Guillaume Delacour <gui@iroqwaorg>; Source for memcached is src:memcached (PTS, buildd, popcon) Reported by: Antoine Beaupre <anarcat@orangeseedsorg> Date: Thu, 29 Mar 2018 21:33:02 UTC Severity: grave Tags ...
Several vulnerabilities were discovered in memcached, a high-performance memory object caching system The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2017-9951 Daniel Shapira reported a heap-based buffer over-read in memcached (resulting from an incomplete fix for CVE-2016-8705) triggered by spe ...
It was discovered that the memcached daemon listened on UDP port 11211 by default An attacker could use memcached for UDP amplification denial-of-service attacks The UDP port has been disabled by default, but can still be enabled It was discovered that the memcached connections using UDP transport protocol can be abused for efficient traffic amp ...
It was discovered that the memcached daemon listened on UDP port 11211 by default An attacker could use memcached for UDP amplification denial-of-service attacks The UDP port has been disabled by default, but can still be enabled It was discovered that the memcached connections using UDP transport protocol can be abused for efficient traffic amp ...
It was discovered that the memcached connections using UDP transport protocol can be abused for efficient traffic amplification distributed denial of service (DDoS) attacks A remote attacker could send a malicious UDP request using a spoofed source IP address of a target system to memcached, causing it to send a significantly larger response to th ...
Memcached version 155 contains an Insufficient Control of Network Message Volume (Network Amplification, CWE-406) vulnerability in the UDP support of the memcached server that can result in denial of service via network flood (traffic amplification of 1:50,000 has been reported by reliable sources) This attack appear to be exploitable via networ ...

Exploits

/** memcached-PoC memcached Proof of Concept Amplification via spoofed source UDP packets Repo includes source code for PoC and approximately 17,000 AMP hosts memcachedc - Source code (pastebincom/raw/ZiUeinae) memecache-amp-03-05-2018-rdlist - List of memcached servers as of 03-05-2018 (pastebincom/raw/eSCHTTVu) Compile: g ...
#-- coding: utf8 -- #!/usr/bin/python # Download: githubcom/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/44265zip import sys, os, time, shodan from pathlib import Path from scapyall import * from contextlib import contextmanager starttime=timetime() @contextmanager def suppress_stdout(): with open(osdevnull, " ...