CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
AI Score
Confidence
Low
EPSS
Percentile
64.5%
libzmq (aka ZeroMQ/C++) 4.0.x before 4.0.5 does not ensure that nonces are unique, which allows man-in-the-middle attackers to conduct replay attacks via unspecified vectors.
Vendor | Product | Version | CPE |
---|---|---|---|
zeromq | zeromq | 4.0.0 | cpe:2.3:a:zeromq:zeromq:4.0.0:*:*:*:*:*:*:* |
zeromq | zeromq | 4.0.1 | cpe:2.3:a:zeromq:zeromq:4.0.1:*:*:*:*:*:*:* |
zeromq | zeromq | 4.0.2 | cpe:2.3:a:zeromq:zeromq:4.0.2:*:*:*:*:*:*:* |
zeromq | zeromq | 4.0.3 | cpe:2.3:a:zeromq:zeromq:4.0.3:*:*:*:*:*:*:* |
zeromq | zeromq | 4.0.4 | cpe:2.3:a:zeromq:zeromq:4.0.4:*:*:*:*:*:*:* |
lists.opensuse.org/opensuse-updates/2014-11/msg00027.html
lists.opensuse.org/opensuse-updates/2014-11/msg00101.html
seclists.org/oss-sec/2014/q3/754
seclists.org/oss-sec/2014/q3/776
secunia.com/advisories/62262
www.securityfocus.com/bid/70157
exchange.xforce.ibmcloud.com/vulnerabilities/96242
github.com/zeromq/libzmq/issues/1191
github.com/zeromq/libzmq/pull/1189