First published: Wed Jul 10 2019(Updated: )
In ZeroMQ libzmq before 4.0.9, 4.1.x before 4.1.7, and 4.2.x before 4.3.2, a remote, unauthenticated client connecting to a libzmq application, running with a socket listening with CURVE encryption/authentication enabled, may cause a stack overflow and overwrite the stack with arbitrary data, due to a buffer overflow in the library. Users running public servers with the above configuration are highly encouraged to upgrade as soon as possible, as there are no known mitigations.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ZeroMQ libzmq | <4.0.9 | |
ZeroMQ libzmq | >=4.1.0<4.1.7 | |
ZeroMQ libzmq | >=4.2.0<4.3.2 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
Canonical Ubuntu Linux | =19.04 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
debian/zeromq3 | 4.3.4-1+deb11u1 4.3.4-6 4.3.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13132 is a vulnerability in ZeroMQ libzmq versions before 4.0.9, 4.1.x before 4.1.7, and 4.2.x before 4.3.2.
CVE-2019-13132 has a severity rating of 9.8 (Critical).
CVE-2019-13132 could allow a remote, unauthenticated client to cause a stack overflow and overwrite the stack with arbitrary data.
ZeroMQ libzmq versions before 4.0.9, 4.1.x before 4.1.7, and 4.2.x before 4.3.2 are affected.
To fix CVE-2019-13132, it is recommended to update ZeroMQ libzmq to version 4.3.2 or later.