Lucene search

K
freebsdFreeBSD8E48365A-214D-11E9-9F8A-0050562A4D7B
HistoryJan 08, 2019 - 12:00 a.m.

libzmq4 -- Remote Code Execution Vulnerability

2019-01-0800:00:00
vuxml.freebsd.org
13

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.532

Percentile

97.6%

A vulnerability has been found that would allow attackers to direct a peer to
jump to and execute from an address indicated by the attacker.
This issue has been present since v4.2.0. Older releases are not affected.

     NOTE: The attacker needs to know in advance valid addresses in the peer's
     memory to jump to, so measures like ASLR are effective mitigations.

     NOTE: this attack can only take place after authentication, so peers behind
     CURVE/GSSAPI are not vulnerable to unauthenticated attackers.
OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchlibzmq4= 4.2.0UNKNOWN
FreeBSDanynoarchlibzmq4< 4.3.1UNKNOWN

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.532

Percentile

97.6%