8.8
CVSSv3

CVE-2019-6250

Published: 13/01/2019 Updated: 03/04/2019
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 801
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

A pointer overflow, with code execution, exists in ZeroMQ libzmq (aka 0MQ) 4.2.x and 4.3.x prior to 4.3.1. A v2_decoder.cpp zmq::v2_decoder_t::size_ready integer overflow allows an authenticated malicious user to overwrite an arbitrary amount of bytes beyond the bounds of a buffer, which can be leveraged to run arbitrary code on the target system. The memory layout allows the malicious user to inject OS commands into a data structure located immediately after the problematic buffer (i.e., it is not necessary to use a typical buffer-overflow exploitation technique that changes the flow of control).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

zeromq libzmq

debian debian linux 9.0

Vendor Advisories

Debian Bug report logs - #919098 libzmq5: remote execution vulnerability Package: libzmq5; Maintainer for libzmq5 is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Source for libzmq5 is src:zeromq3 (PTS, buildd, popcon) Reported by: Luca Boccassi <bluca@debianorg> Date: Sat, 12 Jan 2019 17:27:01 UTC Severity: important ...
A pointer overflow, with code execution, was discovered in ZeroMQ libzmq (aka 0MQ) 42x and 43x before 431 A v2_decodercpp zmq::v2_decoder_t::size_ready integer overflow allows an authenticated attacker to overwrite an arbitrary amount of bytes beyond the bounds of a buffer, which can be leveraged to run arbitrary code on the target system ...