First published: Fri Apr 20 2018(Updated: )
In the trapper functionality of Zabbix Server 2.4.x, specifically crafted trapper packets can pass database logic checks, resulting in database writes. An attacker can set up a Man-in-the-Middle server to alter trapper requests made between an active Zabbix proxy and Server to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/zabbix | 1:4.0.4+dfsg-1 1:4.0.4+dfsg-1+deb10u2 1:5.0.8+dfsg-1 1:6.0.14+dfsg-1 | |
Zabbix Server | >=2.4.0<=2.4.8 | |
Debian | =8.0 | |
Debian | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-2825 is a vulnerability in the trapper functionality of Zabbix Server 2.4.x.
CVE-2017-2825 has a severity level of high (7).
An attacker can exploit CVE-2017-2825 by setting up a Man-in-the-Middle server to alter trapper requests made between an active Zabbix proxy and Server.
Zabbix Server versions 2.4.x are affected by CVE-2017-2825.
You can find more information about CVE-2017-2825 in the references provided: http://www.securityfocus.com/bid/98094, https://talosintelligence.com/vulnerability_reports/TALOS-2017-0326, https://www.debian.org/security/2017/dsa-3937