First published: Mon Jul 08 2019(Updated: )
It was discovered that ZeroMQ incorrectly handled certain application metadata. A remote attacker could use this issue to cause ZeroMQ to crash, or possibly execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libzmq5 | <4.3.1-3ubuntu2.1 | 4.3.1-3ubuntu2.1 |
=19.04 | ||
All of | ||
ubuntu/libzmq5 | <4.2.5-2ubuntu0.2 | 4.2.5-2ubuntu0.2 |
=18.10 | ||
All of | ||
ubuntu/libzmq5 | <4.2.5-1ubuntu0.2 | 4.2.5-1ubuntu0.2 |
=18.04 | ||
All of | ||
ubuntu/libzmq5 | <4.1.4-7ubuntu0.1 | 4.1.4-7ubuntu0.1 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is USN-4050-1.
The ZeroMQ vulnerability is caused by an incorrect handling of certain application metadata, which can allow a remote attacker to crash the application or execute arbitrary code.
The libzmq5 package with versions 4.3.1-3ubuntu2.1, 4.2.5-2ubuntu0.2, 4.2.5-1ubuntu0.2, and 4.1.4-7ubuntu0.1 on Ubuntu 19.04, 18.10, 18.04, and 16.04 respectively.
A remote attacker can exploit this vulnerability by sending specially crafted application metadata to the vulnerable system.
To fix the ZeroMQ vulnerability, update the libzmq5 package to the following versions: 4.3.1-3ubuntu2.1, 4.2.5-2ubuntu0.2, 4.2.5-1ubuntu0.2, and 4.1.4-7ubuntu0.1 on Ubuntu 19.04, 18.10, 18.04, and 16.04 respectively.