CVE-2014-9721
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
03/06/2015
Last modified:
12/04/2025
Description
libzmq before 4.0.6 and 4.1.x before 4.1.1 allows remote attackers to conduct downgrade attacks and bypass ZMTP v3 protocol security mechanisms via a ZMTP v2 or earlier header.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:zeromq:zeromq:*:*:*:*:*:*:*:* | 4.0.5 (including) | |
| cpe:2.3:a:zeromq:zeromq:4.1.0:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159176.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00018.html
- http://www.debian.org/security/2015/dsa-3255
- https://github.com/zeromq/libzmq/issues/1273
- https://github.com/zeromq/zeromq4-x/commit/b6e3e0f601e2c1ec1f3aac880ed6a3fe63043e51
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159176.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00018.html
- http://www.debian.org/security/2015/dsa-3255
- https://github.com/zeromq/libzmq/issues/1273
- https://github.com/zeromq/zeromq4-x/commit/b6e3e0f601e2c1ec1f3aac880ed6a3fe63043e51



