UBUNTU-CVE-2019-13132

Source
https://ubuntu.com/security/CVE-2019-13132
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-13132.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2019-13132
Related
Published
2019-07-08T16:00:00Z
Modified
2019-07-08T16:00:00Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In ZeroMQ libzmq before 4.0.9, 4.1.x before 4.1.7, and 4.2.x before 4.3.2, a remote, unauthenticated client connecting to a libzmq application, running with a socket listening with CURVE encryption/authentication enabled, may cause a stack overflow and overwrite the stack with arbitrary data, due to a buffer overflow in the library. Users running public servers with the above configuration are highly encouraged to upgrade as soon as possible, as there are no known mitigations.

References

Affected packages

Ubuntu:Pro:14.04:LTS / zeromq3

Package

Name
zeromq3
Purl
pkg:deb/ubuntu/zeromq3?arch=src?distro=trusty/esm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.0.4+dfsg-2ubuntu0.1+esm1

Affected versions

3.*

3.2.3+dfsg-2
3.2.4+dfsg-1
3.2.4+dfsg-2
3.2.4+dfsg-3
3.2.4+dfsg-4

4.*

4.0.3+dfsg-1
4.0.4+dfsg-2
4.0.4+dfsg-2ubuntu0.1

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "binary_version": "4.0.4+dfsg-2ubuntu0.1+esm1",
            "binary_name": "libzmq3"
        },
        {
            "binary_version": "4.0.4+dfsg-2ubuntu0.1+esm1",
            "binary_name": "libzmq3-dbg"
        },
        {
            "binary_version": "4.0.4+dfsg-2ubuntu0.1+esm1",
            "binary_name": "libzmq3-dbgsym"
        },
        {
            "binary_version": "4.0.4+dfsg-2ubuntu0.1+esm1",
            "binary_name": "libzmq3-dev"
        },
        {
            "binary_version": "4.0.4+dfsg-2ubuntu0.1+esm1",
            "binary_name": "libzmq3-dev-dbgsym"
        }
    ]
}

Ubuntu:16.04:LTS / zeromq3

Package

Name
zeromq3
Purl
pkg:deb/ubuntu/zeromq3?arch=src?distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.1.4-7ubuntu0.1

Affected versions

4.*

4.0.5+dfsg-3ubuntu1~gcc5.1
4.0.5+dfsg-3ubuntu2
4.1.4-7

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "binary_version": "4.1.4-7ubuntu0.1",
            "binary_name": "libzmq3-dev"
        },
        {
            "binary_version": "4.1.4-7ubuntu0.1",
            "binary_name": "libzmq3-dev-dbgsym"
        },
        {
            "binary_version": "4.1.4-7ubuntu0.1",
            "binary_name": "libzmq5"
        },
        {
            "binary_version": "4.1.4-7ubuntu0.1",
            "binary_name": "libzmq5-dbg"
        },
        {
            "binary_version": "4.1.4-7ubuntu0.1",
            "binary_name": "libzmq5-dbgsym"
        }
    ]
}

Ubuntu:18.04:LTS / zeromq3

Package

Name
zeromq3
Purl
pkg:deb/ubuntu/zeromq3?arch=src?distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.2.5-1ubuntu0.2

Affected versions

4.*

4.2.1-4ubuntu1
4.2.2-1ubuntu2
4.2.3-1
4.2.3-1build1
4.2.5-1
4.2.5-1ubuntu0.1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "high",
    "binaries": [
        {
            "binary_version": "4.2.5-1ubuntu0.2",
            "binary_name": "libzmq3-dev"
        },
        {
            "binary_version": "4.2.5-1ubuntu0.2",
            "binary_name": "libzmq5"
        },
        {
            "binary_version": "4.2.5-1ubuntu0.2",
            "binary_name": "libzmq5-dbgsym"
        }
    ]
}