CVE-2020-15166

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-15166
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-15166.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-15166
Downstream
Related
Published
2020-09-11T16:15:12Z
Modified
2025-10-08T04:04:19.955740Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In ZeroMQ before version 4.3.3, there is a denial-of-service vulnerability. Users with TCP transport public endpoints, even with CURVE/ZAP enabled, are impacted. If a raw TCP socket is opened and connected to an endpoint that is fully configured with CURVE/ZAP, legitimate clients will not be able to exchange any message. Handshakes complete successfully, and messages are delivered to the library, but the server application never receives them. This is patched in version 4.3.3.

References

Affected packages

Git / github.com/zeromq/libzmq

Affected ranges

Type
GIT
Repo
https://github.com/zeromq/libzmq
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v3.*

v3.1.0
v3.2.1

v4.*

v4.1.0
v4.2.0
v4.2.0-rc1
v4.2.1
v4.2.2
v4.2.3
v4.2.4
v4.2.5
v4.3.0
v4.3.1
v4.3.2