Vulnerabilites related to Zabbix - Zabbix Server
CVE-2017-2824 (GCVE-0-2017-2824)
Vulnerability from cvelistv5
Published
2017-05-24 14:00
Modified
2024-08-05 14:09
Severity ?
EPSS score ?
Summary
An exploitable code execution vulnerability exists in the trapper command functionality of Zabbix Server 2.4.X. A specially crafted set of packets can cause a command injection resulting in remote code execution. An attacker can make requests from an active Zabbix Proxy to trigger this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0325 | x_refsource_MISC | |
http://www.securityfocus.com/bid/98083 | vdb-entry, x_refsource_BID | |
http://www.debian.org/security/2017/dsa-3937 | vendor-advisory, x_refsource_DEBIAN |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Zabbix | Zabbix Server |
Version: 2.4.8.r1 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T14:09:16.849Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0325", }, { name: "98083", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/98083", }, { name: "DSA-3937", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2017/dsa-3937", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Zabbix Server", vendor: "Zabbix", versions: [ { status: "affected", version: "2.4.8.r1", }, ], }, ], datePublic: "2017-04-27T00:00:00", descriptions: [ { lang: "en", value: "An exploitable code execution vulnerability exists in the trapper command functionality of Zabbix Server 2.4.X. A specially crafted set of packets can cause a command injection resulting in remote code execution. An attacker can make requests from an active Zabbix Proxy to trigger this vulnerability.", }, ], problemTypes: [ { descriptions: [ { description: "remote code execution", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-11-05T10:57:01", orgId: "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", shortName: "talos", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0325", }, { name: "98083", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/98083", }, { name: "DSA-3937", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2017/dsa-3937", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "talos-cna@cisco.com", ID: "CVE-2017-2824", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Zabbix Server", version: { version_data: [ { version_value: "2.4.8.r1", }, ], }, }, ], }, vendor_name: "Zabbix", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An exploitable code execution vulnerability exists in the trapper command functionality of Zabbix Server 2.4.X. A specially crafted set of packets can cause a command injection resulting in remote code execution. An attacker can make requests from an active Zabbix Proxy to trigger this vulnerability.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "remote code execution", }, ], }, ], }, references: { reference_data: [ { name: "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0325", refsource: "MISC", url: "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0325", }, { name: "98083", refsource: "BID", url: "http://www.securityfocus.com/bid/98083", }, { name: "DSA-3937", refsource: "DEBIAN", url: "http://www.debian.org/security/2017/dsa-3937", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b", assignerShortName: "talos", cveId: "CVE-2017-2824", datePublished: "2017-05-24T14:00:00", dateReserved: "2016-12-01T00:00:00", dateUpdated: "2024-08-05T14:09:16.849Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }