Vulnerability Details : CVE-2016-8706
An integer overflow in process_bin_sasl_auth function in Memcached, which is responsible for authentication commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.
Vulnerability category: OverflowExecute code
Products affected by CVE-2016-8706
- cpe:2.3:a:memcached:memcached:*:*:*:*:*:*:*:*
Threat overview for CVE-2016-8706
Top countries where our scanners detected CVE-2016-8706
Top open port discovered on systems with this issue
11211
IPs affected by CVE-2016-8706 19,032
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2016-8706!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2016-8706
88.74%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-8706
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST | |
8.1
|
HIGH | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.2
|
5.9
|
NIST | |
8.1
|
HIGH | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.2
|
5.9
|
Talos |
CWE ids for CVE-2016-8706
-
The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-8706
-
http://www.securityfocus.com/bid/94083
Memcached Multiple Integer Overflow Vulnerabilities
-
https://security.gentoo.org/glsa/201701-12
memcached: Multiple vulnerabilities (GLSA 201701-12) — Gentoo security
-
http://www.securitytracker.com/id/1037333
memcached Buffer Overflows in process_bin Functions Let Remote Users Execute Arbitrary Code - SecurityTracker
-
http://www.debian.org/security/2016/dsa-3704
Debian -- Security Information -- DSA-3704-1 memcached
-
http://rhn.redhat.com/errata/RHSA-2016-2819.html
RHSA-2016:2819 - Security Advisory - Red Hat Customer Portal
-
http://www.talosintelligence.com/reports/TALOS-2016-0221/
TALOS-2016-0221 || Cisco Talos Intelligence Group - Comprehensive Threat IntelligenceExploit;Technical Description;Third Party Advisory;VDB Entry
Jump to