First published: Sun Jan 13 2019(Updated: )
A pointer overflow, with code execution, was discovered in ZeroMQ libzmq (aka 0MQ) 4.2.x and 4.3.x before 4.3.1. A v2_decoder.cpp zmq::v2_decoder_t::size_ready integer overflow allows an authenticated attacker to overwrite an arbitrary amount of bytes beyond the bounds of a buffer, which can be leveraged to run arbitrary code on the target system. The memory layout allows the attacker to inject OS commands into a data structure located immediately after the problematic buffer (i.e., it is not necessary to use a typical buffer-overflow exploitation technique that changes the flow of control).
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/zeromq3 | 4.3.1-4+deb10u2 4.3.4-1 4.3.4-6 4.3.5-1 | |
ZeroMQ libzmq | >=4.2.0<=4.2.5 | |
ZeroMQ libzmq | >=4.3.0<4.3.1 | |
Debian Debian Linux | =9.0 | |
>=4.2.0<=4.2.5 | ||
>=4.3.0<4.3.1 | ||
=9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-6250 is a pointer overflow vulnerability in ZeroMQ libzmq that allows an authenticated attacker to overwrite an arbitrary amount of bytes beyond the bounds of a buffer.
The severity of CVE-2019-6250 is critical with a CVSS score of 8.8.
An authenticated attacker can exploit CVE-2019-6250 by leveraging the v2_decoder_t::size_ready integer overflow to overwrite bytes beyond the buffer's bounds and execute arbitrary code.
ZeroMQ libzmq versions 4.2.x and 4.3.x before 4.3.1 are affected by CVE-2019-6250.
To fix CVE-2019-6250, upgrade to ZeroMQ libzmq version 4.3.1 or higher.