svn commit: r425107 - head/security/vuxml
Steve Wills
swills at FreeBSD.org
Wed Nov 2 05:26:41 UTC 2016
Author: swills
Date: Wed Nov 2 05:26:39 2016
New Revision: 425107
URL: https://svnweb.freebsd.org/changeset/ports/425107
Log:
Document memcached vulnerabilities
Modified:
head/security/vuxml/vuln.xml
Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml Wed Nov 2 05:05:20 2016 (r425106)
+++ head/security/vuxml/vuln.xml Wed Nov 2 05:26:39 2016 (r425107)
@@ -58,6 +58,48 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="f4bf713f-6ac7-4b76-8980-47bf90c5419f">
+ <topic>memcached -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>memcached</name>
+ <range><lt>1.4.33</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Cisco Talos reports:</p>
+ <blockquote cite="http://blog.talosintel.com/2016/10/memcached-vulnerabilities.html">
+ <p>Multiple integer overflow vulnerabilities exist within Memcached
+ that could be exploited to achieve remote code execution on the
+ targeted system. These vulnerabilities manifest in various Memcached
+ functions that are used in inserting, appending, prepending, or
+ modifying key-value data pairs. Systems which also have Memcached
+ compiled with support for SASL authentication are also vulnerable to
+ a third flaw due to how Memcached handles SASL authentication
+ commands.</p>
+ <p>An attacker could exploit these vulnerabilities by sending a
+ specifically crafted Memcached command to the targeted server.
+ Additionally, these vulnerabilities could also be exploited to leak
+ sensitive process information which an attacker could use to bypass
+ common exploitation mitigations, such as ASLR, and can be triggered
+ multiple times. This enables reliable exploitation which makes these
+ vulnerabilities severe.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://blog.talosintel.com/2016/10/memcached-vulnerabilities.html</url>
+ <cvename>CVE-2016-8704</cvename>
+ <cvename>CVE-2016-8705</cvename>
+ <cvename>CVE-2016-8706</cvename>
+ </references>
+ <dates>
+ <discovery>2016-10-31</discovery>
+ <entry>2016-11-02</entry>
+ </dates>
+ </vuln>
+
<vuln vid="9bc14850-a070-11e6-a881-b499baebfeaf">
<topic>MySQL -- multiple vulnerabilities</topic>
<affects>
More information about the svn-ports-head
mailing list