First published: Thu Dec 31 2009(Updated: )
The NET_TCP_LISTEN function in net.c in Zabbix Agent before 1.6.7, when running on FreeBSD or Solaris, allows remote attackers to bypass the EnableRemoteCommands setting and execute arbitrary commands via shell metacharacters in the argument to net.tcp.listen. NOTE: this attack is limited to attacks from trusted IP addresses.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zabbix Zabbix | <=1.6.6 | |
Zabbix Zabbix | =1.1.2 | |
Zabbix Zabbix | =1.1.3 | |
Zabbix Zabbix | =1.1.4 | |
Zabbix Zabbix | =1.1.5 | |
Zabbix Zabbix | =1.4.2 | |
Zabbix Zabbix | =1.4.3 | |
Zabbix Zabbix | =1.4.4 | |
Zabbix Zabbix | =1.4.6 | |
FreeBSD FreeBSD | ||
Sun Solaris |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.