CVE-2019-6250
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
A pointer overflow, with code execution, was discovered in ZeroMQ libzmq (aka 0MQ) 4.2.x and 4.3.x before 4.3.1. A v2_decoder.cpp zmq::v2_decoder_t::size_ready integer overflow allows an authenticated attacker to overwrite an arbitrary amount of bytes beyond the bounds of a buffer, which can be leveraged to run arbitrary code on the target system. The memory layout allows the attacker to inject OS commands into a data structure located immediately after the problematic buffer (i.e., it is not necessary to use a typical buffer-overflow exploitation technique that changes the flow of control).
Se ha descubierto un desbordamiento de punteros con ejecución de código en ZeroMQ libzmq (también conocido como 0MQ), en versiones 4.2.x y 4.3.x anteriores a la 4.3.1. Un desbordamiento de enteros en zmq::v2_decoder_t::size_ready, en v2_decoder.cpp, permite que un atacante autenticado sobrescriba una cantidad arbitraria de bytes más allá de los límites de un búfer, lo que puede ser aprovechado para ejecutar código arbitrario en el sistema objetivo. La distribución de la memoria permite que el atacante inyecte comandos del sistema operativo en una estructura de datos ubicada inmediatamente tras el búfer problemático (esto es, no es necesario emplear una técnica típica de explotación de desbordamiento de búfer que cambie el flujo de control).
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-01-13 CVE Reserved
- 2019-01-13 CVE Published
- 2024-06-20 First Exploit
- 2024-07-15 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-190: Integer Overflow or Wraparound
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
https://github.com/zeromq/libzmq/releases/tag/v4.3.1 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://github.com/AkashicYiTai/CVE-2019-6250-libzmq | 2024-06-20 | |
https://github.com/zeromq/libzmq/issues/3351 | 2024-08-04 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/201903-22 | 2019-04-03 | |
https://www.debian.org/security/2019/dsa-4368 | 2019-04-03 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Zeromq Search vendor "Zeromq" | Libzmq Search vendor "Zeromq" for product "Libzmq" | >= 4.2.0 <= 4.2.5 Search vendor "Zeromq" for product "Libzmq" and version " >= 4.2.0 <= 4.2.5" | - |
Affected
| ||||||
Zeromq Search vendor "Zeromq" | Libzmq Search vendor "Zeromq" for product "Libzmq" | >= 4.3.0 < 4.3.1 Search vendor "Zeromq" for product "Libzmq" and version " >= 4.3.0 < 4.3.1" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
|