Rapid7 Vulnerability & Exploit Database

SUSE: CVE-2020-15166: SUSE Linux Security Advisory

Back to Search

SUSE: CVE-2020-15166: SUSE Linux Security Advisory

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
09/11/2020
Created
11/14/2020
Added
11/12/2020
Modified
10/22/2021

Description

In ZeroMQ before version 4.3.3, there is a denial-of-service vulnerability. Users with TCP transport public endpoints, even with CURVE/ZAP enabled, are impacted. If a raw TCP socket is opened and connected to an endpoint that is fully configured with CURVE/ZAP, legitimate clients will not be able to exchange any message. Handshakes complete successfully, and messages are delivered to the library, but the server application never receives them. This is patched in version 4.3.3.

Solution(s)

  • suse-upgrade-libunwind
  • suse-upgrade-libunwind-32bit
  • suse-upgrade-libunwind-devel
  • suse-upgrade-libzmq5
  • suse-upgrade-libzmq5-32bit
  • suse-upgrade-zeromq-devel
  • suse-upgrade-zeromq-tools

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;