8.8
CVSSv3

CVE-2019-6250

Published: 13/01/2019 Updated: 03/04/2019
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 801
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

A pointer overflow, with code execution, exists in ZeroMQ libzmq (aka 0MQ) 4.2.x and 4.3.x prior to 4.3.1. A v2_decoder.cpp zmq::v2_decoder_t::size_ready integer overflow allows an authenticated malicious user to overwrite an arbitrary amount of bytes beyond the bounds of a buffer, which can be leveraged to run arbitrary code on the target system. The memory layout allows the malicious user to inject OS commands into a data structure located immediately after the problematic buffer (i.e., it is not necessary to use a typical buffer-overflow exploitation technique that changes the flow of control).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

zeromq libzmq

debian debian linux 9.0

Vendor Advisories

Debian Bug report logs - #919098 libzmq5: remote execution vulnerability Package: libzmq5; Maintainer for libzmq5 is Laszlo Boszormenyi (GCS) <gcs@debianorg>; Source for libzmq5 is src:zeromq3 (PTS, buildd, popcon) Reported by: Luca Boccassi <bluca@debianorg> Date: Sat, 12 Jan 2019 17:27:01 UTC Severity: important ...
A pointer overflow, with code execution, was discovered in ZeroMQ libzmq (aka 0MQ) 42x and 43x before 431 A v2_decodercpp zmq::v2_decoder_t::size_ready integer overflow allows an authenticated attacker to overwrite an arbitrary amount of bytes beyond the bounds of a buffer, which can be leveraged to run arbitrary code on the target system ...

Github Repositories

CVE-2019-6250-libzmq ZeroMQ(ZMQ) ZeroMQ(ZMQ)是一个高性能的异步消息库,旨在为分布式或并行计算环境提供一个高效、灵活的消息传递机制。ZeroMQ提供了多种消息传递模式(如请求-应答、发布-订阅、推送-拉取、代理等),并支持多种传输协议(如TCP、IPC、PGM等)。ZeroMQ的设计目标是简化网络编程