First published: Thu Dec 21 2006(Updated: )
Multiple buffer overflows in zabbix before 20061006 allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code via long strings to the (1) zabbix_log and (2) zabbix_syslog functions.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zabbix Server | =1.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6693 is classified as a high-severity vulnerability due to its potential for application crash and arbitrary code execution.
The fix for CVE-2006-6693 involves upgrading to a newer version of Zabbix where the buffer overflow vulnerabilities are addressed.
CVE-2006-6693 affects Zabbix versions prior to 20061006, specifically version 1.1.2.
Exploiting CVE-2006-6693 can lead to application crashes and potentially allow an attacker to execute arbitrary code.
CVE-2006-6693 involves vulnerabilities in the zabbix_log and zabbix_syslog functions related to buffer overflows.