Описание
libzmq (aka ZeroMQ/C++) 4.0.x before 4.0.5 does not ensure that nonces are unique, which allows man-in-the-middle attackers to conduct replay attacks via unspecified vectors.
libzmq (aka ZeroMQ/C++) 4.0.x before 4.0.5 does not ensure that nonces are unique, which allows man-in-the-middle attackers to conduct replay attacks via unspecified vectors.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2014-7203
- https://github.com/zeromq/libzmq/issues/1191
- https://github.com/zeromq/libzmq/pull/1189
- https://exchange.xforce.ibmcloud.com/vulnerabilities/96242
- http://lists.opensuse.org/opensuse-updates/2014-11/msg00027.html
- http://lists.opensuse.org/opensuse-updates/2014-11/msg00101.html
- http://seclists.org/oss-sec/2014/q3/754
- http://seclists.org/oss-sec/2014/q3/776
- http://secunia.com/advisories/62262
- http://www.securityfocus.com/bid/70157
EPSS
CVE ID
Связанные уязвимости
libzmq (aka ZeroMQ/C++) 4.0.x before 4.0.5 does not ensure that nonces are unique, which allows man-in-the-middle attackers to conduct replay attacks via unspecified vectors.
libzmq (aka ZeroMQ/C++) 4.0.x before 4.0.5 does not ensure that nonces are unique, which allows man-in-the-middle attackers to conduct replay attacks via unspecified vectors.
libzmq (aka ZeroMQ/C++) 4.0.x before 4.0.5 does not ensure that nonces are unique, which allows man-in-the-middle attackers to conduct replay attacks via unspecified vectors.
libzmq (aka ZeroMQ/C++) 4.0.x before 4.0.5 does not ensure that nonces ...
EPSS