Couchbase Server 6.5.x, 6.6.0 through 6.6.2, and 7.0.0, has a Buffer Overflow. A specially crafted network packet sent from an attacker can crash memcached.
                
            References
                    | Link | Resource | 
|---|---|
| https://docs.couchbase.com/server/current/release-notes/relnotes.html | Release Notes Vendor Advisory | 
| https://www.couchbase.com/alerts | Vendor Advisory | 
| https://docs.couchbase.com/server/current/release-notes/relnotes.html | Release Notes Vendor Advisory | 
| https://www.couchbase.com/alerts | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    No history.
Information
                Published : 2021-09-29 20:15
Updated : 2024-11-21 06:12
NVD link : CVE-2021-35945
Mitre link : CVE-2021-35945
CVE.ORG link : CVE-2021-35945
JSON object : View
Products Affected
                couchbase
- couchbase_server
CWE
                
                    
                        
                        CWE-120
                        
            Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
