Lucene search

K
gentooGentoo FoundationGLSA-201903-22
HistoryMar 28, 2019 - 12:00 a.m.

ZeroMQ: Code execution

2019-03-2800:00:00
Gentoo Foundation
security.gentoo.org
96

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.532

Percentile

97.6%

Background

Looks like an embeddable networking library but acts like a concurrency framework

Description

Please reference the CVE for details.

Impact

Please reference the CVE for details.

Workaround

There is no known workaround at this time.

Resolution

All ZeroMQ users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-libs/zeromq-4.3.1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-libs/zeromq< 4.3.1UNKNOWN

CVSS2

9

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.532

Percentile

97.6%