memcached SASL Authentication Security Bypass

Medium Nessus Plugin ID 72217


The remote object store has an authentication bypass vulnerability.


The version of memcached on the remote host has an authentication bypass vulnerability. This flaw is related to the management of the SASL authentication state. With a series of specially crafted requests, a remote attacker can authenticate with invalid SASL credentials. Successful exploitation allows the attacker to perform unauthorized actions, which may aid in launching further attacks.


Upgrade to memcached 1.4.17 or later.

See Also

Plugin Details

Severity: Medium

ID: 72217

File Name: memcached_sasl_auth_bypass.nasl

Version: $Revision: 1.2 $

Type: remote

Family: Misc.

Published: 2014/01/30

Modified: 2015/09/24

Dependencies: 26197

Risk Information

Risk Factor: Medium


Base Score: 6.4

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:memcached:memcached

Exploit Available: false

Exploit Ease: No known exploits are available

Exploited by Nessus: true

Patch Publication Date: 2013/12/20

Vulnerability Publication Date: 2013/12/20

Reference Information

CVE: CVE-2013-7239

BID: 64559

OSVDB: 101565