ArchLinux: 201410-4: zeromq: Man-in-the-middle downgrade and replay attack
Summary
- CVE-2014-7202 (downgrade attack)
A bug in stream_engine.cpp allows man-in-the-middle attackers to conduct
downgrade attacks via a crafted connection request.
- CVE-2014-7203 (replay attack)
libzmq did not ensure that nonces are unique, which allows
man-in-the-middle attackers to conduct replay attacks via unspecified
vectors.
Resolution
Upgrade to 4.0.5-1.
# pacman -Syu "zeromq>=4.0.5-1"
The problem has been fixed upstream in version 4.0.5.
References
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7202 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7203 https://github.com/zeromq/libzmq/issues/1190 https://github.com/zeromq/libzmq/issues/1191 https://bugs.archlinux.org/task/42381 https://seclists.org/oss-sec/2014/q3/776
Workaround
None.