Gentoo Linux Security Advisory 201406-13 - Multiple vulnerabilities have been found in memcached, allowing remote attackers to execute arbitrary code or cause Denial of Service. Versions less than 1.4.17 are affected.
05cfaf212de31fc2d8fac7f61b07b5e97592a8e4949897646e3931bdc59185a3
Mandriva Linux Security Advisory 2009-202 - Multiple integer overflows in memcached 1.1.12 and 1.2.2 allow remote attackers to execute arbitrary code via vectors involving length attributes that trigger heap-based buffer overflows. This update provides a solution to this vulnerability. Additionally memcached-1.2.x has been upgraded to 1.2.8 for 2009.0/2009.1 and MES 5 that contains a number of upstream fixes, the repcached patch has been upgraded to 2.2 as well.
e6e9ee0c52adb3613ae8674db4468595b6600a305b72fb7f18fea4e6429e6caa
Debian Security Advisory 1853-1 - Ronald Volgers discovered that memcached, a high-performance memory object caching system, is vulnerable to several heap-based buffer overflows due to integer conversions when parsing certain length attributes. An attacker can use this to execute arbitrary code on the system running memcached (on etch with root privileges).
f71cf554ce3885432ea696405897c37491e96e62aac0cdc2acb222f696e060be