TopVuln

High-risk vulnerability digests

CVE-2019-6250

  • HIGH

Exploit for Integer Overflow or Wraparound in Zeromq Libzmq

Details

CVSS v3
8.8
CVSS v2
9.0
NVD published
2019-01-13 15:29:00
EPSS
28.5% probability · 96.5th percentile — 2026-05-02
Affected versions
cpe:2.3:a:zeromq:libzmq:*:*:*:*:*:*:*:* cpe:2.3:a:zeromq:libzmq:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Summary
A pointer overflow, with code execution, was discovered in ZeroMQ libzmq (aka 0MQ) 4.2.x and 4.3.x before 4.3.1. A v2_decoder.cpp zmq::v2_decoder_t::size_ready integer overflow allows an authenticated attacker to overwrite an arbitrary amount of bytes beyond the bounds of a buffer, which can be leveraged to run arbitrary code on the target system. The memory layout allows the attacker to inject OS commands into a data structure located immediately after the problematic buffer (i.e., it is not necessary to use a typical buffer-overflow exploitation technique that changes the flow of control).
Remediation
Not available in our cache.
Exploit info
https://github.com/zeromq/libzmq/issues/3351

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.