This report provides an overview of the Memcrashed vulnerability, including potential threats to computer systems and networks, how the vulnerability works, and its usage. It also evaluates countermeasures and security policies and techniques. The report analyzes the likely future importance and effectiveness of the Memcrashed vulnerability.