Input validation error in zeromq - CVE-2014-7202
Published: October 8, 2014 / Updated: August 4, 2020
Vulnerability identifier: #VU33834
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2014-7202
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: ZeroMQ Project
Affected software:
zeromq
zeromq
Detailed vulnerability description
The vulnerability allows a remote non-authenticated attacker to manipulate data.
stream_engine.cpp in libzmq (aka ZeroMQ/C++)) 4.0.5 before 4.0.5 allows man-in-the-middle attackers to conduct downgrade attacks via a crafted connection request.
How to mitigate CVE-2014-7202
Install update from vendor's website.
Sources
- http://lists.opensuse.org/opensuse-updates/2014-11/msg00027.html
- http://lists.opensuse.org/opensuse-updates/2014-11/msg00101.html
- http://seclists.org/oss-sec/2014/q3/754
- http://seclists.org/oss-sec/2014/q3/776
- http://secunia.com/advisories/62262
- http://www.securityfocus.com/bid/70157
- https://exchange.xforce.ibmcloud.com/vulnerabilities/96241
- https://github.com/zeromq/libzmq/issues/1190
- https://github.com/zeromq/libzmq/pull/1188