memcached SASL Authentication Security Bypass

medium Nessus Plugin ID 72217

Synopsis

The remote object store has an authentication bypass vulnerability.

Description

The version of memcached on the remote host has an authentication bypass vulnerability. This flaw is related to the management of the SASL authentication state. With a series of specially crafted requests, a remote attacker can authenticate with invalid SASL credentials. Successful exploitation allows the attacker to perform unauthorized actions, which may aid in launching further attacks.

Solution

Upgrade to memcached 1.4.17 or later.

See Also

https://code.google.com/archive/p/memcached/issues/316

https://code.google.com/archive/p/memcached/wikis/ReleaseNotes1417.wiki

Plugin Details

Severity: Medium

ID: 72217

File Name: memcached_sasl_auth_bypass.nasl

Version: 1.6

Type: remote

Family: Misc.

Published: 1/30/2014

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.7

CVSS v2

Risk Factor: Medium

Base Score: 4.8

Temporal Score: 3.8

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2013-7239

Vulnerability Information

CPE: cpe:/a:memcached:memcached

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 12/20/2013

Vulnerability Publication Date: 12/20/2013

Reference Information

CVE: CVE-2013-7239

BID: 64559