Zeromq Libzmq vulnerabilities
7 known vulnerabilities affecting zeromq/libzmq.
Total CVEs
7
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH4MEDIUM1
Vulnerabilities
Page 1 of 1
CVE-2020-36400CRITICALCVSS 9.8v4.3.32021-07-01
CVE-2020-36400 [CRITICAL] CWE-787 CVE-2020-36400: ZeroMQ libzmq 4.3.3 has a heap-based buffer overflow in zmq::tcp_read, a different vulnerability tha
ZeroMQ libzmq 4.3.3 has a heap-based buffer overflow in zmq::tcp_read, a different vulnerability than CVE-2021-20235.
nvd
CVE-2021-20237HIGHCVSS 7.5≥ 4.2.0, < 4.3.32021-05-28
CVE-2021-20237 [HIGH] CWE-400 CVE-2021-20237: An uncontrolled resource consumption (memory leak) flaw was found in ZeroMQ's src/xpub.cpp in versio
An uncontrolled resource consumption (memory leak) flaw was found in ZeroMQ's src/xpub.cpp in versions before 4.3.3. This flaw allows a remote unauthenticated attacker to send crafted PUB messages that consume excessive memory if the CURVE/ZAP authentication is disabled on the server, causing a denial of service. The highest threat from this vulnerabi
nvd
CVE-2021-20235HIGHCVSS 8.1≥ 4.2.0, < 4.3.32021-04-01
CVE-2021-20235 [HIGH] CWE-120 CVE-2021-20235: There's a flaw in the zeromq server in versions before 4.3.3 in src/decoder_allocators.hpp. The deco
There's a flaw in the zeromq server in versions before 4.3.3 in src/decoder_allocators.hpp. The decoder static allocator could have its sized changed, but the buffer would remain the same as it is a static buffer. A remote, unauthenticated attacker who sends a crafted request to the zeromq server could trigger a buffer overflow WRITE of arbitrary data
nvd
CVE-2021-20234MEDIUMCVSS 6.5fixed in 4.3.32021-04-01
CVE-2021-20234 [MEDIUM] CWE-400 CVE-2021-20234: An uncontrolled resource consumption (memory leak) flaw was found in the ZeroMQ client in versions b
An uncontrolled resource consumption (memory leak) flaw was found in the ZeroMQ client in versions before 4.3.3 in src/pipe.cpp. This issue causes a client that connects to multiple malicious or compromised servers to crash. The highest threat from this vulnerability is to system availability.
nvd
CVE-2020-15166HIGHCVSS 7.5fixed in 4.3.32020-09-11
CVE-2020-15166 [HIGH] CWE-400 CVE-2020-15166: In ZeroMQ before version 4.3.3, there is a denial-of-service vulnerability. Users with TCP transport
In ZeroMQ before version 4.3.3, there is a denial-of-service vulnerability. Users with TCP transport public endpoints, even with CURVE/ZAP enabled, are impacted. If a raw TCP socket is opened and connected to an endpoint that is fully configured with CURVE/ZAP, legitimate clients will not be able to exchange any message. Handshakes complete successful
nvd
CVE-2019-13132CRITICALCVSS 9.8fixed in 4.0.9≥ 4.1.0, < 4.1.7+1 more2019-07-10
CVE-2019-13132 [CRITICAL] CWE-787 CVE-2019-13132: In ZeroMQ libzmq before 4.0.9, 4.1.x before 4.1.7, and 4.2.x before 4.3.2, a remote, unauthenticated
In ZeroMQ libzmq before 4.0.9, 4.1.x before 4.1.7, and 4.2.x before 4.3.2, a remote, unauthenticated client connecting to a libzmq application, running with a socket listening with CURVE encryption/authentication enabled, may cause a stack overflow and overwrite the stack with arbitrary data, due to a buffer overflow in the library. Users running
nvd
CVE-2019-6250HIGHCVSS 8.8≥ 4.2.0, ≤ 4.2.5≥ 4.3.0, < 4.3.12019-01-13
CVE-2019-6250 [HIGH] CWE-190 CVE-2019-6250: A pointer overflow, with code execution, was discovered in ZeroMQ libzmq (aka 0MQ) 4.2.x and 4.3.x b
A pointer overflow, with code execution, was discovered in ZeroMQ libzmq (aka 0MQ) 4.2.x and 4.3.x before 4.3.1. A v2_decoder.cpp zmq::v2_decoder_t::size_ready integer overflow allows an authenticated attacker to overwrite an arbitrary amount of bytes beyond the bounds of a buffer, which can be leveraged to run arbitrary code on the target system. The m
nvd