Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2021-20235

Опубликовано: 01 апр. 2021
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.8
CVSS3: 8.1

Описание

There's a flaw in the zeromq server in versions before 4.3.3 in src/decoder_allocators.hpp. The decoder static allocator could have its sized changed, but the buffer would remain the same as it is a static buffer. A remote, unauthenticated attacker who sends a crafted request to the zeromq server could trigger a buffer overflow WRITE of arbitrary data if CURVE/ZAP authentication is not enabled. The greatest impact of this flaw is to application availability, data integrity, and confidentiality.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

not-affected

4.3.4-1
esm-apps/bionic

released

4.2.5-1ubuntu0.2+esm2
esm-apps/focal

released

4.3.2-2ubuntu1.20.04.1~esm2
esm-apps/jammy

not-affected

4.3.4-1
esm-apps/noble

not-affected

4.3.4-1
esm-apps/xenial

not-affected

code not present
esm-infra-legacy/trusty

not-affected

4.0.4+dfsg-2ubuntu0.1+esm2
focal

ignored

end of standard support, was needed
groovy

ignored

end of life

Показывать по

EPSS

Процентиль: 93%
0.09493
Низкий

6.8 Medium

CVSS2

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
redhat
больше 5 лет назад

There's a flaw in the zeromq server in versions before 4.3.3 in src/decoder_allocators.hpp. The decoder static allocator could have its sized changed, but the buffer would remain the same as it is a static buffer. A remote, unauthenticated attacker who sends a crafted request to the zeromq server could trigger a buffer overflow WRITE of arbitrary data if CURVE/ZAP authentication is not enabled. The greatest impact of this flaw is to application availability, data integrity, and confidentiality.

CVSS3: 8.1
nvd
почти 5 лет назад

There's a flaw in the zeromq server in versions before 4.3.3 in src/decoder_allocators.hpp. The decoder static allocator could have its sized changed, but the buffer would remain the same as it is a static buffer. A remote, unauthenticated attacker who sends a crafted request to the zeromq server could trigger a buffer overflow WRITE of arbitrary data if CURVE/ZAP authentication is not enabled. The greatest impact of this flaw is to application availability, data integrity, and confidentiality.

CVSS3: 8.1
debian
почти 5 лет назад

There's a flaw in the zeromq server in versions before 4.3.3 in src/de ...

CVSS3: 8.1
github
больше 3 лет назад

There's a flaw in the zeromq server in versions before 4.3.3 in src/decoder_allocators.hpp. The decoder static allocator could have its sized changed, but the buffer would remain the same as it is a static buffer. A remote, unauthenticated attacker who sends a crafted request to the zeromq server could trigger a buffer overflow WRITE of arbitrary data if CURVE/ZAP authentication is not enabled. The greatest impact of this flaw is to application availability, data integrity, and confidentiality.

CVSS3: 8.1
fstec
почти 5 лет назад

Уязвимость библиотеки для обмена сообщениями ZeroMQ, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

EPSS

Процентиль: 93%
0.09493
Низкий

6.8 Medium

CVSS2

8.1 High

CVSS3