|Category:||Debian Local Security Checks|
|Title:||Debian Security Advisory DSA 1853-1 (memcached)|
|Summary:||Debian Security Advisory DSA 1853-1 (memcached)|
|Description:||The remote host is missing an update to memcached|
announced via advisory DSA 1853-1.
Ronald Volgers discovered that memcached, a high-performance memory object
caching system, is vulnerable to several heap-based buffer overflows due
to integer conversions when parsing certain length attributes. An
attacker can use this to execute arbitrary code on the system running
memcached (on etch with root privileges).
For the oldstable distribution (etch), this problem has been fixed in
For the stable distribution (lenny), this problem has been fixed in
For the testing (squeeze) and unstable (sid) distribution , this problem
will be fixed soon.
We recommend that you upgrade your memcached packages.
Common Vulnerability Exposure (CVE) ID: CVE-2009-2415|
Debian Security Information: DSA-1853 (Google Search)
BugTraq ID: 35989
|Copyright||Copyright (c) 2009 E-Soft Inc. http://www.securityspace.com|
|This is only one of 40037 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.