{"id":"CVE-2013-7239","details":"memcached before 1.4.17 allows remote attackers to bypass authentication by sending an invalid request with SASL credentials, then sending another request with incorrect SASL credentials.","modified":"2026-04-16T06:17:14.961142278Z","published":"2014-01-13T21:55:05Z","related":["SUSE-SU-2018:0778-1","SUSE-SU-2018:0807-1","openSUSE-SU-2024:10021-1"],"references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/56183"},{"type":"ADVISORY","url":"http://www.debian.org/security/2014/dsa-2832"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-2080-1"},{"type":"FIX","url":"https://code.google.com/p/memcached/wiki/ReleaseNotes1417"},{"type":"WEB","url":"http://seclists.org/oss-sec/2013/q4/572"},{"type":"WEB","url":"http://www.securityfocus.com/bid/64559"}],"schema_version":"1.7.5"}