FreeBSD : memcached -- multiple vulnerabilities (f4bf713f-6ac7-4b76-8980-47bf90c5419f)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing a security-related update.

Description :

Cisco Talos reports :

Multiple integer overflow vulnerabilities exist within Memcached that
could be exploited to achieve remote code execution on the targeted
system. These vulnerabilities manifest in various Memcached functions
that are used in inserting, appending, prepending, or modifying
key-value data pairs. Systems which also have Memcached compiled with
support for SASL authentication are also vulnerable to a third flaw
due to how Memcached handles SASL authentication commands.

An attacker could exploit these vulnerabilities by sending a
specifically crafted Memcached command to the targeted server.
Additionally, these vulnerabilities could also be exploited to leak
sensitive process information which an attacker could use to bypass
common exploitation mitigations, such as ASLR, and can be triggered
multiple times. This enables reliable exploitation which makes these
vulnerabilities severe.

See also :

http://blog.talosintel.com/2016/10/memcached-vulnerabilities.html
http://www.nessus.org/u?ad9291f2

Solution :

Update the affected package.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 94459 ()

Bugtraq ID:

CVE ID: CVE-2016-8704
CVE-2016-8705
CVE-2016-8706

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now