Summary
The remote host is missing an update to memcached
announced via advisory DSA 1853-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201853-1
Insight
Ronald Volgers discovered that memcached, a high-performance memory object caching system, is vulnerable to several heap-based buffer overflows due to integer conversions when parsing certain length attributes. An attacker can use this to execute arbitrary code on the system running memcached (on etch with root privileges).
For the oldstable distribution (etch), this problem has been fixed in version 1.1.12-1+etch1.
For the stable distribution (lenny), this problem has been fixed in version 1.2.2-1+lenny1.
For the testing (squeeze) and unstable (sid) distribution , this problem will be fixed soon.
We recommend that you upgrade your memcached packages.
Severity
Classification
-
CVE CVE-2009-2415 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities