Comment #18 on issue 192 by [email protected]: Crash when sending specially crafted packet
http://code.google.com/p/memcached/issues/detail?id=192

@dormando: I agree with your points and kudos for maintaining this software. I agree bad patches can hurt the codebase a lot, but I guess people had good intentions and the lack of clear patch submission guidelines makes this process a bit ambiguous.

@brian: (Disclaimer: I ain't a security expert, so take this with a grain of salt) I believe this vulnerability isn't useful by itself, but it can become a link in a chain of attacks, where the attacker first gains access to a memcached client machine (using another vulnerability), and then uses this bug to hijack the memcached process. Beside getting access to the host machine, the memcached server may hold potentially sensitive and private information, which could be leaked to the attacker.

PS: FYI, this bug was discovered using the Cloud9 automated testing engine, now available at http://cloud9.epfl.ch/ The tool is knowledgeable enough to generate test cases to expose the bug through a crash, but the real risk is that the bug can be exploited in a more elaborate way, e.g., inject and execute arbitrary code.


--
You received this message because this project is configured to send all issue notifications to this address.
You may adjust your notification preferences at:
https://code.google.com/hosting/settings

--

--- You received this message because you are subscribed to the Google Groups "memcached" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/groups/opt_out.


Reply via email to