An uncontrolled resource consumption (memory leak) flaw was found in ZeroMQs src/xpub.cpp in versions before 4.3.3. This flaw allows a remote unauthenticated attacker to send crafted PUB messages that consume excessive memory if the CURVE/ZAP authentication is disabled on the server, causing a denial of service. The highest threat from this vulnerability is to system availability.
The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Libzmq | Zeromq | 4.2.0 (including) | 4.3.3 (excluding) |
Zeromq3 | Ubuntu | bionic | * |
Zeromq3 | Ubuntu | esm-apps/bionic | * |
Zeromq3 | Ubuntu | esm-apps/focal | * |
Zeromq3 | Ubuntu | groovy | * |
Zeromq3 | Ubuntu | trusty | * |
Zeromq3 | Ubuntu | upstream | * |
Zeromq3 | Ubuntu | xenial | * |