Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

This site is deprecated. Please CLICK HERE for latest updates

Short Name

APP:MISC:CVE-2019-6250-IN-OVER

Severity

Critical

Recommended

No

Recommended Action

Drop

Category

APP

Keywords

ZeroMQ libzmq v2_decoder Integer Overflow

Release Date

2019/03/13

Update Number

3150

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+

APP: ZeroMQ libzmq v2_decoder Integer Overflow


This signature detects attempts to exploit a known vulnerability against ZeroMQ libzmq. A successful attack can lead to arbitrary code execution.

Extended Description

A pointer overflow, with code execution, was discovered in ZeroMQ libzmq (aka 0MQ) 4.2.x and 4.3.x before 4.3.1. A v2_decoder.cpp zmq::v2_decoder_t::size_ready integer overflow allows an authenticated attacker to overwrite an arbitrary amount of bytes beyond the bounds of a buffer, which can be leveraged to run arbitrary code on the target system. The memory layout allows the attacker to inject OS commands into a data structure located immediately after the problematic buffer (i.e., it is not necessary to use a typical buffer-overflow exploitation technique that changes the flow of control).

Affected Products

  • Debian debian_linux 9.0
  • Zeromq libzmq 4.2.0
  • Zeromq libzmq 4.2.1
  • Zeromq libzmq 4.2.2
  • Zeromq libzmq 4.2.3
  • Zeromq libzmq 4.2.4
  • Zeromq libzmq 4.2.5
  • Zeromq libzmq 4.3.0

References

  • CVE: CVE-2019-6250
  • URL: https://github.com/zeromq/libzmq/issues/3351
  • URL: https://github.com/zeromq/libzmq/releases/tag/v4.3.1

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out