First published: Thu Dec 31 2009(Updated: )
The zbx_get_next_field function in libs/zbxcommon/str.c in Zabbix Server before 1.6.8 allows remote attackers to cause a denial of service (crash) via a request that lacks expected separators, which triggers a NULL pointer dereference, as demonstrated using the Command keyword.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zabbix Zabbix | =1.1.2 | |
Zabbix Zabbix | =1.1.4 | |
Zabbix Zabbix | =1.4.3 | |
Zabbix Zabbix | <=1.6.7 | |
Zabbix Zabbix | =1.4.6 | |
Zabbix Zabbix | =1.4.4 | |
Zabbix Zabbix | =1.1.3 | |
Zabbix Zabbix | =1.6.6 | |
Zabbix Zabbix | =1.4.2 | |
Zabbix Zabbix | =1.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4501 has a severity rating that indicates it can lead to a denial of service due to a NULL pointer dereference.
To fix CVE-2009-4501, upgrade your Zabbix Server to version 1.6.8 or later.
CVE-2009-4501 affects Zabbix Server versions up to 1.6.7, including versions 1.1.2, 1.1.3, 1.1.4, 1.1.5, 1.4.2, 1.4.3, 1.4.4, 1.4.6, and 1.6.6.
CVE-2009-4501 is a denial of service vulnerability caused by improper input handling.
Yes, CVE-2009-4501 can be exploited remotely by sending a specially crafted request that lacks expected separators.