{"id":"CVE-2014-9721","details":"libzmq before 4.0.6 and 4.1.x before 4.1.1 allows remote attackers to conduct downgrade attacks and bypass ZMTP v3 protocol security mechanisms via a ZMTP v2 or earlier header.","modified":"2026-01-27T04:13:36.510002Z","published":"2015-06-03T20:59:00Z","withdrawn":"2026-01-27T04:13:36.510002Z","related":["SUSE-FU-2022:0444-1","SUSE-FU-2022:0445-1","SUSE-SU-2015:1510-1","openSUSE-SU-2024:10038-1"],"references":[{"type":"ADVISORY","url":"http://www.debian.org/security/2015/dsa-3255"},{"type":"FIX","url":"https://github.com/zeromq/zeromq4-x/commit/b6e3e0f601e2c1ec1f3aac880ed6a3fe63043e51"},{"type":"REPORT","url":"https://github.com/zeromq/libzmq/issues/1273"},{"type":"WEB","url":"http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159176.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-updates/2015-06/msg00018.html"}],"schema_version":"1.7.3"}