memcached SASL Authentication Security Bypass

Medium Nessus Plugin ID 72217

Synopsis

The remote object store has an authentication bypass vulnerability.

Description

The version of memcached on the remote host has an authentication bypass vulnerability. This flaw is related to the management of the SASL authentication state. With a series of specially crafted requests, a remote attacker can authenticate with invalid SASL credentials. Successful exploitation allows the attacker to perform unauthorized actions, which may aid in launching further attacks.

Solution

Upgrade to memcached 1.4.17 or later.

See Also

https://code.google.com/archive/p/memcached/issues/316

https://code.google.com/archive/p/memcached/wikis/ReleaseNotes1417.wiki

Plugin Details

Severity: Medium

ID: 72217

File Name: memcached_sasl_auth_bypass.nasl

Version: 1.5

Type: remote

Family: Misc.

Published: 2014/01/30

Updated: 2019/11/26

Dependencies: 26197

Risk Information

Risk Factor: Medium

CVSS Score Source: CVE-2013-7239

CVSS v2.0

Base Score: 4.8

Temporal Score: 3.8

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:N

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:memcached:memcached

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 2013/12/20

Vulnerability Publication Date: 2013/12/20

Reference Information

CVE: CVE-2013-7239

BID: 64559