In ZeroMQ libzmq before 4.0.9, 4.1.x before 4.1.7, and 4.2.x before 4.3.2, a remote, unauthenticated client connecting to a libzmq application, running with a socket listening with CURVE encryption/authentication enabled, may cause a stack overflow and overwrite the stack with arbitrary data, due to a buffer overflow in the library. Users running public servers with the above configuration are highly encouraged to upgrade as soon as possible, as there are no known mitigations.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| 
 | 
Configuration 3 (hide)
| 
 | 
Configuration 4 (hide)
| 
 | 
History
                    No history.
Information
                Published : 2019-07-10 19:15
Updated : 2024-04-11 22:15
NVD link : CVE-2019-13132
Mitre link : CVE-2019-13132
CVE.ORG link : CVE-2019-13132
JSON object : View
Products Affected
                fedoraproject
- fedora
zeromq
- libzmq
canonical
- ubuntu_linux
debian
- debian_linux
CWE
                
                    
                        
                        CWE-787
                        
            Out-of-bounds Write
