First published: Fri Jan 29 2021(Updated: )
A flaw was found in zeromq before 4.3.3. The use of a static allocator with ZMTP v1 packets may lead to a heap based overflow. References: <a href="https://github.com/zeromq/libzmq/pull/3902">https://github.com/zeromq/libzmq/pull/3902</a> <a href="https://github.com/zeromq/libzmq/security/advisories/GHSA-fc3w-qxf5-7hp6">https://github.com/zeromq/libzmq/security/advisories/GHSA-fc3w-qxf5-7hp6</a> <a href="https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21984">https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=21984</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ZeroMQ libzmq | >=4.2.0<4.3.3 | |
redhat/zeromq | <4.3.3 | 4.3.3 |
debian/zeromq3 | 4.3.4-1+deb11u1 4.3.4-6 4.3.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-20235.
The severity of CVE-2021-20235 is high, with a severity value of 8.1.
The affected software for CVE-2021-20235 includes versions before 4.3.3 of zeromq server.
A remote, unauthenticated attacker can exploit CVE-2021-20235 by sending a crafted request to the zeromq server.
You can find more information about CVE-2021-20235 on the CVE Mitre website.