Bug 1221666 (CVE-2014-9721) - CVE-2014-9721 zeromq: protocol downgrade attack on sockets using the ZMTP v3 protocol
Summary: CVE-2014-9721 zeromq: protocol downgrade attack on sockets using the ZMTP v3 ...
Alias: CVE-2014-9721
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Depends On:
Blocks: 1221668
TreeView+ depends on / blocked
Reported: 2015-05-14 14:08 UTC by Vasyl Kaigorodov
Modified: 2019-09-29 13:32 UTC (History)
8 users (show)

Fixed In Version: 0MQ 4.0.6
Doc Type: Bug Fix
Doc Text:
Clone Of:
Last Closed: 2015-07-06 10:45:01 UTC

Attachments (Terms of Use)

Description Vasyl Kaigorodov 2015-05-14 14:08:32 UTC
It was discovered that zeromq, a lightweight messaging kernel, is
susceptible to a protocol downgrade attack on sockets using the ZMTP v3
protocol. This could allow remote attackers to bypass ZMTP v3 security
mechanisms by sending ZMTP v2 or earlier headers.

CVE request: http://openwall.com/lists/oss-security/2015/05/07/8
Upstream bug report: https://github.com/zeromq/libzmq/issues/1273
Upstream fix: https://github.com/zeromq/zeromq4-x/commit/b6e3e0f601e2c1ec1f3aac880ed6a3fe63043e51

Comment 1 Thomas Spura 2015-05-22 08:00:59 UTC
If I read the whiteboard correctly fedora-all/zeromq should be not affected by this attack, but in F22 and F23 it is as versions 4.0.5 are used there.

It is fixed in rawhide with:

and an update for F22 is on the way:

Comment 2 Tomas Hoger 2015-05-22 11:00:24 UTC
I believe fedora was noted as not affected as no released version include affected 4.x version.

Comment 3 Fedora Update System 2015-05-30 15:41:46 UTC
zeromq-4.0.5-3.fc22 has been pushed to the Fedora 22 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 4 Siddharth Sharma 2015-07-06 10:45:01 UTC
ceph-1.2 ships zeromq-3.2.5 which is not affected by this flaw.

Note You need to log in before you can comment on or make changes to this bug.