CVE-2021-20236

A flaw was found in the ZeroMQ server in versions before 4.3.3. This flaw allows a malicious client to cause a stack buffer overflow on the server by sending crafted topic subscription requests and then unsubscribing. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:zeromq:zeromq:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:ceph_storage:2.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*

History

No history.

Information

Published : 2021-05-28 11:15

Updated : 2024-02-28 18:28


NVD link : CVE-2021-20236

Mitre link : CVE-2021-20236

CVE.ORG link : CVE-2021-20236


JSON object : View

Products Affected

fedoraproject

  • fedora

redhat

  • enterprise_linux
  • ceph_storage

zeromq

  • zeromq
CWE
CWE-787

Out-of-bounds Write

CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')