CVE-2023-46852

In Memcached before 1.6.22, a buffer overflow exists when processing multiget requests in proxy mode, if there are many spaces after the "get" substring.
Configurations

Configuration 1 (hide)

cpe:2.3:a:memcached:memcached:*:*:*:*:*:*:*:*

History

07 Nov 2023, 19:53

Type Values Removed Values Added
CWE CWE-120
CPE cpe:2.3:a:memcached:memcached:*:*:*:*:*:*:*:*
First Time Memcached
Memcached memcached
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References (MISC) https://github.com/memcached/memcached/commit/76a6c363c18cfe7b6a1524ae64202ac9db330767 - (MISC) https://github.com/memcached/memcached/commit/76a6c363c18cfe7b6a1524ae64202ac9db330767 - Patch
References (MISC) https://github.com/memcached/memcached/compare/1.6.21...1.6.22 - (MISC) https://github.com/memcached/memcached/compare/1.6.21...1.6.22 - Release Notes

27 Oct 2023, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-10-27 20:15

Updated : 2023-12-10 15:14


NVD link : CVE-2023-46852

Mitre link : CVE-2023-46852

CVE.ORG link : CVE-2023-46852


JSON object : View

Products Affected

memcached

  • memcached
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')