Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-15166

Опубликовано: 11 сент. 2020
Источник: debian
EPSS Низкий

Описание

In ZeroMQ before version 4.3.3, there is a denial-of-service vulnerability. Users with TCP transport public endpoints, even with CURVE/ZAP enabled, are impacted. If a raw TCP socket is opened and connected to an endpoint that is fully configured with CURVE/ZAP, legitimate clients will not be able to exchange any message. Handshakes complete successfully, and messages are delivered to the library, but the server application never receives them. This is patched in version 4.3.3.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
zeromq3fixed4.3.3-1package

Примечания

  • https://www.openwall.com/lists/oss-security/2020/09/07/3

  • https://github.com/zeromq/libzmq/security/advisories/GHSA-25wp-cf8g-938m

  • https://github.com/zeromq/libzmq/commit/e7f0090b161ce6344f6bd35009816a925c070b09

EPSS

Процентиль: 53%
0.00303
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 5 лет назад

In ZeroMQ before version 4.3.3, there is a denial-of-service vulnerability. Users with TCP transport public endpoints, even with CURVE/ZAP enabled, are impacted. If a raw TCP socket is opened and connected to an endpoint that is fully configured with CURVE/ZAP, legitimate clients will not be able to exchange any message. Handshakes complete successfully, and messages are delivered to the library, but the server application never receives them. This is patched in version 4.3.3.

CVSS3: 7.5
redhat
больше 5 лет назад

In ZeroMQ before version 4.3.3, there is a denial-of-service vulnerability. Users with TCP transport public endpoints, even with CURVE/ZAP enabled, are impacted. If a raw TCP socket is opened and connected to an endpoint that is fully configured with CURVE/ZAP, legitimate clients will not be able to exchange any message. Handshakes complete successfully, and messages are delivered to the library, but the server application never receives them. This is patched in version 4.3.3.

CVSS3: 7.5
nvd
больше 5 лет назад

In ZeroMQ before version 4.3.3, there is a denial-of-service vulnerability. Users with TCP transport public endpoints, even with CURVE/ZAP enabled, are impacted. If a raw TCP socket is opened and connected to an endpoint that is fully configured with CURVE/ZAP, legitimate clients will not be able to exchange any message. Handshakes complete successfully, and messages are delivered to the library, but the server application never receives them. This is patched in version 4.3.3.

suse-cvrf
около 5 лет назад

Security update for zeromq

suse-cvrf
около 5 лет назад

Security update for zeromq

EPSS

Процентиль: 53%
0.00303
Низкий