CVE-2023-27478
CVSS V2 None
CVSS V3 None
Description
libmemcached-awesome is an open source C/C++ client library and tools for the memcached server. `libmemcached` could return data for a previously requested key, if that previous request timed out due to a low `POLL_TIMEOUT`. This issue has been addressed in version 1.1.4. Users are advised to upgrade. There are several ways to workaround or lower the probability of this bug affecting a given deployment. 1: use a reasonably high `POLL_TIMEOUT` setting, like the default. 2: use separate libmemcached connections for unrelated data. 3: do not re-use libmemcached connections in an unknown state.
Overview
- CVE ID
- CVE-2023-27478
- Assigner
- security-advisories@github.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-03-07T18:15:09
- Last Modified Date
- 2023-03-23T16:59:14
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:awesome:libmemcached:*:*:*:*:*:*:*:* | 1 | OR | 1.0.18 | 1.1.4 |
References
Reference URL | Reference Tags |
---|---|
https://github.com/awesomized/libmemcached/commit/48dcc61a | Patch |
https://github.com/awesomized/libmemcached/releases/tag/1.1.4 | Release Notes |
https://github.com/awesomized/libmemcached/security/advisories/GHSA-wwmh-39wj-fx59 | Patch Third Party Advisory |
https://github.com/php-memcached-dev/php-memcached/issues/531 | Exploit Issue Tracking Patch Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-27478 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27478 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 06:03:41 | Added to TrackCVE | |||
2023-04-17 06:03:43 | Weakness Enumeration | new |