CVE-2021-20236

A flaw was found in the ZeroMQ server in versions before 4.3.3. This flaw allows a malicious client to cause a stack buffer overflow on the server by sending crafted topic subscription requests and then unsubscribing. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:zeromq:zeromq:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:ceph_storage:2.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*

History

05 Aug 2022, 15:21

Type Values Removed Values Added
CWE CWE-120

02 Jun 2021, 15:35

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8
CPE cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ceph_storage:2.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:a:zeromq:zeromq:*:*:*:*:*:*:*:*
References (MISC) https://github.com/zeromq/libzmq/security/advisories/GHSA-qq65-x72m-9wr8 - (MISC) https://github.com/zeromq/libzmq/security/advisories/GHSA-qq65-x72m-9wr8 - Patch, Third Party Advisory
References (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1921976 - (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=1921976 - Issue Tracking, Third Party Advisory

28 May 2021, 11:37

Type Values Removed Values Added
CWE CWE-787
CWE-120

28 May 2021, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-05-28 11:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-20236

Mitre link : CVE-2021-20236

CVE.ORG link : CVE-2021-20236


JSON object : View

Products Affected

redhat

  • enterprise_linux
  • ceph_storage

zeromq

  • zeromq

fedoraproject

  • fedora
CWE
CWE-787

Out-of-bounds Write

CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')