cve/2019/CVE-2019-13132.md

19 lines
981 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-13132](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13132)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
In ZeroMQ libzmq before 4.0.9, 4.1.x before 4.1.7, and 4.2.x before 4.3.2, a remote, unauthenticated client connecting to a libzmq application, running with a socket listening with CURVE encryption/authentication enabled, may cause a stack overflow and overwrite the stack with arbitrary data, due to a buffer overflow in the library. Users running public servers with the above configuration are highly encouraged to upgrade as soon as possible, as there are no known mitigations.
### POC
#### Reference
- https://github.com/zeromq/libzmq/issues/3558
- https://usn.ubuntu.com/4050-1/
#### Github
No PoCs found on GitHub currently.