There's a flaw in the zeromq server in versions before 4.3.3 in src/decoder_allocators.hpp. The decoder static allocator could have its sized changed, but the buffer would remain the same as it is a static buffer. A remote, unauthenticated attacker who sends a crafted request to the zeromq server could trigger a buffer overflow WRITE of arbitrary data if CURVE/ZAP authentication is not enabled. The greatest impact of this flaw is to application availability, data integrity, and confidentiality.
{ "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "4.0.4+dfsg-2ubuntu0.1+esm2", "binary_name": "libzmq3" }, { "binary_version": "4.0.4+dfsg-2ubuntu0.1+esm2", "binary_name": "libzmq3-dbg" }, { "binary_version": "4.0.4+dfsg-2ubuntu0.1+esm2", "binary_name": "libzmq3-dbgsym" }, { "binary_version": "4.0.4+dfsg-2ubuntu0.1+esm2", "binary_name": "libzmq3-dev" }, { "binary_version": "4.0.4+dfsg-2ubuntu0.1+esm2", "binary_name": "libzmq3-dev-dbgsym" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "4.2.5-1ubuntu0.2+esm2", "binary_name": "libzmq3-dev" }, { "binary_version": "4.2.5-1ubuntu0.2+esm2", "binary_name": "libzmq5" }, { "binary_version": "4.2.5-1ubuntu0.2+esm2", "binary_name": "libzmq5-dbgsym" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "4.3.2-2ubuntu1.20.04.1~esm2", "binary_name": "libzmq3-dev" }, { "binary_version": "4.3.2-2ubuntu1.20.04.1~esm2", "binary_name": "libzmq5" }, { "binary_version": "4.3.2-2ubuntu1.20.04.1~esm2", "binary_name": "libzmq5-dbgsym" } ] }