CVE-2014-7203
Publication date 8 October 2014
Last updated 24 July 2024
Ubuntu priority
libzmq (aka ZeroMQ/C++) 4.0.x before 4.0.5 does not ensure that nonces are unique, which allows man-in-the-middle attackers to conduct replay attacks via unspecified vectors.
From the Ubuntu Security Team
Matthew Hawn discovered that ZeroMQ did validate that connection nonces were unique. A remote attacker could use this vulnerability to conduct replay attacks.
Status
Package | Ubuntu Release | Status |
---|---|---|
zeromq | 18.04 LTS bionic | Not in release |
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Not affected
|
|
zeromq3 | 18.04 LTS bionic |
Not affected
|
16.04 LTS xenial |
Not affected
|
|
14.04 LTS trusty |
Fixed 4.0.4+dfsg-2ubuntu0.1
|
|