DEBIAN-CVE-2013-0179

Source
https://security-tracker.debian.org/tracker/CVE-2013-0179
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2013-0179.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2013-0179
Upstream
Published
2014-01-13T21:55:05Z
Modified
2025-09-25T00:28:51.676940Z
Summary
[none]
Details

The processbindelete function in memcached.c in memcached 1.4.4 and other versions before 1.4.17, when running in verbose mode, allows remote attackers to cause a denial of service (segmentation fault) via a request to delete a key, which does not account for the lack of a null terminator in the key and triggers a buffer over-read when printing to stderr.

References

Affected packages

Debian:11 / memcached

Package

Name
memcached
Purl
pkg:deb/debian/memcached?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.13-0.2

Ecosystem specific

{
    "urgency": "low"
}

Debian:12 / memcached

Package

Name
memcached
Purl
pkg:deb/debian/memcached?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.13-0.2

Ecosystem specific

{
    "urgency": "low"
}

Debian:13 / memcached

Package

Name
memcached
Purl
pkg:deb/debian/memcached?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.13-0.2

Ecosystem specific

{
    "urgency": "low"
}

Debian:14 / memcached

Package

Name
memcached
Purl
pkg:deb/debian/memcached?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.13-0.2

Ecosystem specific

{
    "urgency": "low"
}