First published: Thu Dec 31 2009(Updated: )
The NET_TCP_LISTEN function in net.c in Zabbix Agent before 1.6.7, when running on FreeBSD or Solaris, allows remote attackers to bypass the EnableRemoteCommands setting and execute arbitrary commands via shell metacharacters in the argument to net.tcp.listen. NOTE: this attack is limited to attacks from trusted IP addresses.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zabbix Zabbix | <=1.6.6 | |
Zabbix Zabbix | =1.1.2 | |
Zabbix Zabbix | =1.1.3 | |
Zabbix Zabbix | =1.1.4 | |
Zabbix Zabbix | =1.1.5 | |
Zabbix Zabbix | =1.4.2 | |
Zabbix Zabbix | =1.4.3 | |
Zabbix Zabbix | =1.4.4 | |
Zabbix Zabbix | =1.4.6 | |
FreeBSD FreeBSD | ||
Oracle Solaris SPARC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4502 is classified as a moderate severity vulnerability that allows remote command execution.
To fix CVE-2009-4502, upgrade Zabbix Agent to version 1.6.7 or later.
CVE-2009-4502 affects Zabbix Agent versions prior to 1.6.7 running on FreeBSD or Solaris.
Yes, CVE-2009-4502 can be exploited remotely by attackers to execute arbitrary commands.
CVE-2009-4502 specifically affects the NET_TCP_LISTEN function within the Zabbix Agent.