[zeromq-announce] CVE-2019-13132: denial of service via stack overflow with arbitrary data

Luca Boccassi luca.boccassi at gmail.com
Mon Jul 8 18:22:31 CEST 2019


Hello,

A security vulnerability has been reported on libzmq/zeromq.

CVE-2019-13132: a remote, unauthenticated client connecting to a
libzmq application, running with a socket listening with CURVE
encryption/authentication enabled, may cause a stack overflow and
overwrite the stack with arbitrary data, due to a buffer overflow in
the library. Users running public servers with the above configuration
are highly encouraged to upgrade as soon as possible, as there are no
known mitigations. All versions from 4.0.0 and upwards are affected.

Thank you Fang-Pen Lin for finding the issue and reporting it!

The following upstream releases fixes the issue and will be shortly
available:

https://github.com/zeromq/libzmq/releases/tag/v4.3.2
https://github.com/zeromq/zeromq4-x/releases/tag/v4.0.9
https://github.com/zeromq/zeromq4-1/releases/tag/v4.1.7

Individual backported patches can be found on the upstream bug tracker,
and have been sent separately to the security teams of various
distributions:

https://github.com/zeromq/libzmq/issues/3558

The programs to reproduce the issue will be shared on the 15th of July.

-- 
Kind regards,
Luca Boccassi
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 488 bytes
Desc: This is a digitally signed message part
URL: <https://lists.zeromq.org/pipermail/zeromq-announce/attachments/20190708/a98ade19/attachment.sig>


More information about the zeromq-announce mailing list