// For flags

CVE-2019-6250

 

Severity Score

8.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A pointer overflow, with code execution, was discovered in ZeroMQ libzmq (aka 0MQ) 4.2.x and 4.3.x before 4.3.1. A v2_decoder.cpp zmq::v2_decoder_t::size_ready integer overflow allows an authenticated attacker to overwrite an arbitrary amount of bytes beyond the bounds of a buffer, which can be leveraged to run arbitrary code on the target system. The memory layout allows the attacker to inject OS commands into a data structure located immediately after the problematic buffer (i.e., it is not necessary to use a typical buffer-overflow exploitation technique that changes the flow of control).

Se ha descubierto un desbordamiento de punteros con ejecución de código en ZeroMQ libzmq (también conocido como 0MQ), en versiones 4.2.x y 4.3.x anteriores a la 4.3.1. Un desbordamiento de enteros en zmq::v2_decoder_t::size_ready, en v2_decoder.cpp, permite que un atacante autenticado sobrescriba una cantidad arbitraria de bytes más allá de los límites de un búfer, lo que puede ser aprovechado para ejecutar código arbitrario en el sistema objetivo. La distribución de la memoria permite que el atacante inyecte comandos del sistema operativo en una estructura de datos ubicada inmediatamente tras el búfer problemático (esto es, no es necesario emplear una técnica típica de explotación de desbordamiento de búfer que cambie el flujo de control).

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2019-01-13 CVE Reserved
  • 2019-01-13 CVE Published
  • 2024-06-20 First Exploit
  • 2024-08-04 CVE Updated
  • 2024-11-22 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-190: Integer Overflow or Wraparound
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Zeromq
Search vendor "Zeromq"
Libzmq
Search vendor "Zeromq" for product "Libzmq"
>= 4.2.0 <= 4.2.5
Search vendor "Zeromq" for product "Libzmq" and version " >= 4.2.0 <= 4.2.5"
-
Affected
Zeromq
Search vendor "Zeromq"
Libzmq
Search vendor "Zeromq" for product "Libzmq"
>= 4.3.0 < 4.3.1
Search vendor "Zeromq" for product "Libzmq" and version " >= 4.3.0 < 4.3.1"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
9.0
Search vendor "Debian" for product "Debian Linux" and version "9.0"
-
Affected