Vulnerability Description
In Memcached before 1.6.22, a buffer overflow exists when processing multiget requests in proxy mode, if there are many spaces after the "get" substring.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Memcached | Memcached | < 1.6.22 |
Related Weaknesses (CWE)
References
- https://github.com/memcached/memcached/commit/76a6c363c18cfe7b6a1524ae64202ac9dbPatch
- https://github.com/memcached/memcached/compare/1.6.21...1.6.22Release Notes
- https://github.com/memcached/memcached/commit/76a6c363c18cfe7b6a1524ae64202ac9dbPatch
- https://github.com/memcached/memcached/compare/1.6.21...1.6.22Release Notes
FAQ
What is CVE-2023-46852?
CVE-2023-46852 is a vulnerability with a CVSS score of 7.5 (HIGH). In Memcached before 1.6.22, a buffer overflow exists when processing multiget requests in proxy mode, if there are many spaces after the "get" substring.
How severe is CVE-2023-46852?
CVE-2023-46852 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-46852?
Check the references section above for vendor advisories and patch information. Affected products include: Memcached Memcached.