{"id":"DEBIAN-CVE-2011-4971","details":"Multiple integer signedness errors in the (1) process_bin_sasl_auth, (2) process_bin_complete_sasl_auth, (3) process_bin_update, and (4) process_bin_append_prepend functions in Memcached 1.4.5 and earlier allow remote attackers to cause a denial of service (crash) via a large body length value in a packet.","modified":"2025-11-19T01:01:59.724570Z","published":"2013-12-12T18:55:03.897Z","upstream":["CVE-2011-4971"],"references":[{"type":"ADVISORY","url":"https://security-tracker.debian.org/tracker/CVE-2011-4971"}],"affected":[{"package":{"name":"memcached","ecosystem":"Debian:11","purl":"pkg:deb/debian/memcached?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.13-0.3"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2011-4971.json"}},{"package":{"name":"memcached","ecosystem":"Debian:12","purl":"pkg:deb/debian/memcached?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.13-0.3"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2011-4971.json"}},{"package":{"name":"memcached","ecosystem":"Debian:13","purl":"pkg:deb/debian/memcached?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.13-0.3"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2011-4971.json"}},{"package":{"name":"memcached","ecosystem":"Debian:14","purl":"pkg:deb/debian/memcached?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.13-0.3"}]}],"ecosystem_specific":{"urgency":"not yet assigned"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2011-4971.json"}}],"schema_version":"1.7.3"}