Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-15166

Опубликовано: 07 сент. 2020
Источник: redhat
CVSS3: 7.5
EPSS Низкий

Описание

In ZeroMQ before version 4.3.3, there is a denial-of-service vulnerability. Users with TCP transport public endpoints, even with CURVE/ZAP enabled, are impacted. If a raw TCP socket is opened and connected to an endpoint that is fully configured with CURVE/ZAP, legitimate clients will not be able to exchange any message. Handshakes complete successfully, and messages are delivered to the library, but the server application never receives them. This is patched in version 4.3.3.

A flaw was found in ZeroMQ, where the possibility of unauthenticated clients causes a denial of service that affects authenticated and encrypted clients. The highest threat from this vulnerability is to system availability.

Отчет

Red Hat Ceph Storage 2 is now in the Extended Life Support (ELS) Phase of the support and maintenance life cycle and receives only qualified Important and Critical impact security fixes. This issue has been rated as having a security impact of Moderate and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Ceph Storage Life Cycle: https://access.redhat.com/articles/1372203

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Ceph Storage 2zeromq3Out of support scope

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=1875223zeromq: unauthenticated clients causing denial-of-service

EPSS

Процентиль: 53%
0.00303
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 5 лет назад

In ZeroMQ before version 4.3.3, there is a denial-of-service vulnerability. Users with TCP transport public endpoints, even with CURVE/ZAP enabled, are impacted. If a raw TCP socket is opened and connected to an endpoint that is fully configured with CURVE/ZAP, legitimate clients will not be able to exchange any message. Handshakes complete successfully, and messages are delivered to the library, but the server application never receives them. This is patched in version 4.3.3.

CVSS3: 7.5
nvd
больше 5 лет назад

In ZeroMQ before version 4.3.3, there is a denial-of-service vulnerability. Users with TCP transport public endpoints, even with CURVE/ZAP enabled, are impacted. If a raw TCP socket is opened and connected to an endpoint that is fully configured with CURVE/ZAP, legitimate clients will not be able to exchange any message. Handshakes complete successfully, and messages are delivered to the library, but the server application never receives them. This is patched in version 4.3.3.

CVSS3: 7.5
debian
больше 5 лет назад

In ZeroMQ before version 4.3.3, there is a denial-of-service vulnerabi ...

suse-cvrf
около 5 лет назад

Security update for zeromq

suse-cvrf
около 5 лет назад

Security update for zeromq

EPSS

Процентиль: 53%
0.00303
Низкий

7.5 High

CVSS3