Search CVE reports
1 – 10 of 11 results
CVE-2020-36400
Medium priorityZeroMQ libzmq 4.3.3 has a heap-based buffer overflow in zmq::tcp_read, a different vulnerability than CVE-2021-20235.
1 affected packages
zeromq3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
zeromq3 | — | Not affected | Not affected | Not affected | Not affected |
CVE-2021-20237
Low prioritySome fixes available 2 of 3
An uncontrolled resource consumption (memory leak) flaw was found in ZeroMQ's src/xpub.cpp in versions before 4.3.3. This flaw allows a remote unauthenticated attacker to send crafted PUB messages that consume excessive memory if...
1 affected packages
zeromq3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
zeromq3 | Not affected | Not affected | Fixed | Fixed | Not affected |
CVE-2021-20236
Medium priorityA flaw was found in the ZeroMQ server in versions before 4.3.3. This flaw allows a malicious client to cause a stack buffer overflow on the server by sending crafted topic subscription requests and then unsubscribing. The highest...
1 affected packages
zeromq3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
zeromq3 | Not affected | Not affected | Vulnerable | Vulnerable | Vulnerable |
CVE-2021-20235
Medium prioritySome fixes available 2 of 3
There's a flaw in the zeromq server in versions before 4.3.3 in src/decoder_allocators.hpp. The decoder static allocator could have its sized changed, but the buffer would remain the same as it is a static buffer. A remote,...
1 affected packages
zeromq3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
zeromq3 | Not affected | Not affected | Fixed | Fixed | Not affected |
CVE-2021-20234
Low prioritySome fixes available 4 of 5
An uncontrolled resource consumption (memory leak) flaw was found in the ZeroMQ client in versions before 4.3.3 in src/pipe.cpp. This issue causes a client that connects to multiple malicious or compromised servers to crash. The...
1 affected packages
zeromq3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
zeromq3 | Not affected | Not affected | Fixed | Fixed | Fixed |
CVE-2020-15166
Medium prioritySome fixes available 4 of 5
In ZeroMQ before version 4.3.3, there is a denial-of-service vulnerability. Users with TCP transport public endpoints, even with CURVE/ZAP enabled, are impacted. If a raw TCP socket is opened and connected to an endpoint that is...
1 affected packages
zeromq3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
zeromq3 | Not affected | Not affected | Fixed | Fixed | Fixed |
CVE-2019-13132
High priorityIn ZeroMQ libzmq before 4.0.9, 4.1.x before 4.1.7, and 4.2.x before 4.3.2, a remote, unauthenticated client connecting to a libzmq application, running with a socket listening with CURVE encryption/authentication enabled, may...
1 affected packages
zeromq3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
zeromq3 | — | Fixed | Fixed | Fixed | Fixed |
CVE-2019-6250
Medium priorityA pointer overflow, with code execution, was discovered in ZeroMQ libzmq (aka 0MQ) 4.2.x and 4.3.x before 4.3.1. A v2_decoder.cpp zmq::v2_decoder_t::size_ready integer overflow allows an authenticated attacker to overwrite an...
1 affected packages
zeromq3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
zeromq3 | — | — | — | Fixed | Not affected |
CVE-2014-9721
Medium prioritySome fixes available 2 of 3
libzmq before 4.0.6 and 4.1.x before 4.1.1 allows remote attackers to conduct downgrade attacks and bypass ZMTP v3 protocol security mechanisms via a ZMTP v2 or earlier header.
1 affected packages
zeromq3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
zeromq3 | — | — | — | Not affected | Not affected |
CVE-2014-7203
Medium prioritySome fixes available 1 of 6
libzmq (aka ZeroMQ/C++) 4.0.x before 4.0.5 does not ensure that nonces are unique, which allows man-in-the-middle attackers to conduct replay attacks via unspecified vectors.
2 affected packages
zeromq, zeromq3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
zeromq | — | — | — | Not in release | Not affected |
zeromq3 | — | — | — | Not affected | Not affected |