CVE-2009-1255

The process_stat function in (1) Memcached before 1.2.8 and (2) MemcacheDB 1.2.0 discloses (a) the contents of /proc/self/maps in response to a stats maps command and (b) memory-allocation statistics in response to a stats malloc command, which allows remote attackers to obtain sensitive information such as the locations of memory regions, and defeat ASLR protection, by sending a command to the daemon's TCP port.
References
Link Resource
http://archives.neohapsis.com/archives/fulldisclosure/2009-04/0282.html
http://code.google.com/p/memcachedb/source/browse/trunk/ChangeLog?spec=svn98&r=98
http://code.google.com/p/memcachedb/source/detail?r=98
http://code.google.com/p/memcachedb/source/diff?spec=svn98&r=98&format=side&path=/trunk/memcachedb.c Exploit Patch
http://groups.google.com/group/memcached/browse_thread/thread/ff96a9b88fb5d40e
http://osvdb.org/54127
http://secunia.com/advisories/34915 Vendor Advisory
http://secunia.com/advisories/34932 Vendor Advisory
http://secunia.com/advisories/35175
http://www.mandriva.com/security/advisories?name=MDVSA-2009:105
http://www.positronsecurity.com/advisories/2009-001.html Exploit
http://www.securityfocus.com/archive/1/503064/100/0/threaded
http://www.securityfocus.com/bid/34756
http://www.securitytracker.com/id?1022140
http://www.vupen.com/english/advisories/2009/1196 Vendor Advisory
http://www.vupen.com/english/advisories/2009/1197 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/50221
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00851.html
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01256.html
http://archives.neohapsis.com/archives/fulldisclosure/2009-04/0282.html
http://code.google.com/p/memcachedb/source/browse/trunk/ChangeLog?spec=svn98&r=98
http://code.google.com/p/memcachedb/source/detail?r=98
http://code.google.com/p/memcachedb/source/diff?spec=svn98&r=98&format=side&path=/trunk/memcachedb.c Exploit Patch
http://groups.google.com/group/memcached/browse_thread/thread/ff96a9b88fb5d40e
http://osvdb.org/54127
http://secunia.com/advisories/34915 Vendor Advisory
http://secunia.com/advisories/34932 Vendor Advisory
http://secunia.com/advisories/35175
http://www.mandriva.com/security/advisories?name=MDVSA-2009:105
http://www.positronsecurity.com/advisories/2009-001.html Exploit
http://www.securityfocus.com/archive/1/503064/100/0/threaded
http://www.securityfocus.com/bid/34756
http://www.securitytracker.com/id?1022140
http://www.vupen.com/english/advisories/2009/1196 Vendor Advisory
http://www.vupen.com/english/advisories/2009/1197 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/50221
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg00851.html
https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01256.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:memcachedb:memcached:*:*:*:*:*:*:*:*
cpe:2.3:a:memcachedb:memcached:0.0.1:*:*:*:*:*:*:*
cpe:2.3:a:memcachedb:memcached:0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:memcachedb:memcached:0.0.3:*:*:*:*:*:*:*
cpe:2.3:a:memcachedb:memcached:0.0.4:*:*:*:*:*:*:*
cpe:2.3:a:memcachedb:memcached:0.1.0:*:*:*:*:*:*:*
cpe:2.3:a:memcachedb:memcached:0.1.1:*:*:*:*:*:*:*
cpe:2.3:a:memcachedb:memcached:1.0.0:beta:*:*:*:*:*:*
cpe:2.3:a:memcachedb:memcached:1.0.1:beta:*:*:*:*:*:*
cpe:2.3:a:memcachedb:memcached:1.0.2:beta:*:*:*:*:*:*
cpe:2.3:a:memcachedb:memcached:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:memcachedb:memcached:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:memcachedb:memcached:1.1.0:beta:*:*:*:*:*:*
cpe:2.3:a:memcachedb:memcached:1.2.0:beta:*:*:*:*:*:*
cpe:2.3:a:memcachedb:memcached:1.2.1:beta:*:*:*:*:*:*

History

No history.

Information

Published : 2009-04-30 20:30

Updated : 2025-04-09 00:30


NVD link : CVE-2009-1255

Mitre link : CVE-2009-1255

CVE.ORG link : CVE-2009-1255


JSON object : View

Products Affected

memcachedb

  • memcached
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor