4.3
CVSSv2

CVE-2014-9721

Published: 03/06/2015 Updated: 03/01/2017
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

libzmq prior to 4.0.6 and 4.1.x prior to 4.1.1 allows remote malicious users to conduct downgrade attacks and bypass ZMTP v3 protocol security mechanisms via a ZMTP v2 or earlier header.

Vulnerable Product Search on Vulmon Subscribe to Product

zeromq zeromq

zeromq zeromq 4.1.0

Vendor Advisories

Debian Bug report logs - #784366 zeromq3: CVE-2014-9721: V3 protocol handler vulnerable to downgrade attacks Package: zeromq3; Maintainer for zeromq3 is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Reported by: John Morris <john@zultroncom> Date: Tue, 5 May 2015 20:03:01 UTC Severity: grave Tags: fixed-upstream, secu ...
It was discovered that libzmq, a lightweight messaging kernel, is susceptible to a protocol downgrade attack on sockets using the ZMTP v3 protocol This could allow remote attackers to bypass ZMTP v3 security mechanisms by sending ZMTP v2 or earlier headers For the stable distribution (jessie), this problem has been fixed in version 405+dfsg-2+d ...