Vulnerability Description
Memcached version 1.5.5 contains an Insufficient Control of Network Message Volume (Network Amplification, CWE-406) vulnerability in the UDP support of the memcached server that can result in denial of service via network flood (traffic amplification of 1:50,000 has been reported by reliable sources). This attack appear to be exploitable via network connectivity to port 11211 UDP. This vulnerability appears to have been fixed in 1.5.6 due to the disabling of the UDP protocol by default.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Memcached | Memcached | 1.5.5 |
| Canonical | Ubuntu Linux | 14.04 |
| Debian | Debian Linux | 8.0 |
| Redhat | Openstack | 8 |
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHBA-2018:2140Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:1593Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:1627Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:2331Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:2857Third Party Advisory
- https://blogs.akamai.com/2018/03/memcached-fueled-13-tbps-attacks.htmlThird Party Advisory
- https://github.com/memcached/memcached/commit/dbb7a8af90054bf4ef51f5814ef7ceb17dPatchThird Party Advisory
- https://github.com/memcached/memcached/issues/348Issue TrackingThird Party Advisory
- https://github.com/memcached/memcached/wiki/ReleaseNotes156Third Party Advisory
- https://twitter.com/dormando/status/968579781729009664Third Party Advisory
- https://usn.ubuntu.com/3588-1/Third Party Advisory
- https://www.debian.org/security/2018/dsa-4218Third Party Advisory
- https://www.exploit-db.com/exploits/44264/ExploitThird Party AdvisoryVDB Entry
- https://www.exploit-db.com/exploits/44265/ExploitThird Party AdvisoryVDB Entry
- https://www.synology.com/support/security/Synology_SA_18_07Third Party Advisory
FAQ
What is CVE-2018-1000115?
CVE-2018-1000115 is a vulnerability with a CVSS score of 7.5 (HIGH). Memcached version 1.5.5 contains an Insufficient Control of Network Message Volume (Network Amplification, CWE-406) vulnerability in the UDP support of the memcached server that can result in denial o...
How severe is CVE-2018-1000115?
CVE-2018-1000115 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-1000115?
Check the references section above for vendor advisories and patch information. Affected products include: Memcached Memcached, Canonical Ubuntu Linux, Debian Debian Linux, Redhat Openstack.