libzmq3-dev needs to be backported from disco to xenial because of zmq vulnerabilities, as documented here - https://github.com/zcore-coin/zcore-source/issues/8

Bug #1840948 reported by Ray Qiu
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Xenial Backports
Won't Fix
Undecided
Unassigned

Bug Description

https://github.com/zcore-coin/zcore-source/issues/8

Description:
A pointer overflow, with code execution, was discovered in ZeroMQ libzmq (aka 0MQ) 4.2.x and 4.3.x before 4.3.1. A v2_decoder.cpp zmq::v2_decoder_t::size_ready integer overflow allows an authenticated attacker to overwrite an arbitrary amount of bytes beyond the bounds of a buffer, which can be leveraged to run arbitrary code on the target system. The memory layout allows the attacker to inject OS commands into a data structure located immediately after the problematic buffer (i.e., it is not necessary to use a typical buffer-overflow exploitation technique that changes the flow of control).

Exploit details
Now that msg_size_ has been set to a very high value, the attacker is allowed to send this amount of bytes, and libzmq will copy it to its internal buffer without any further checks.

This means that it's possible to write beyond the bounds of the allocated space.

However, for the exploit this is not necessary to corrupt memory beyond the buffer proper.

P.o.C
Remote code execution vulnerability #3351

how to fix it:
Update zmq to 4.3.1

CVE References

Revision history for this message
Dan Streetman (ddstreet) wrote :

Hello,

the backports process has recently been updated, please see the new documentation:
https://wiki.ubuntu.com/UbuntuBackports

I'm closing this bug, but please feel free to open a new bug (or reopen this bug) using the new process, if appropriate.

Changed in xenial-backports:
status: New → Won't Fix
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.