First published: Mon Dec 18 2023(Updated: )
The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server.
Credit: security@zabbix.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zabbix Agent | >=5.0.0<=5.0.39 | |
Zabbix Agent | >=6.0.0<=6.0.23 | |
Zabbix Agent | >=6.4.0<=6.4.8 | |
Zabbix Agent | =7.0.0-alpha1 | |
Zabbix Agent | =7.0.0-alpha6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-32726 is classified as a medium vulnerability.
To fix CVE-2023-32726, upgrade the Zabbix agent to a version that is not affected, such as versions above 5.0.39, 6.0.23, or 6.4.8.
CVE-2023-32726 affects Zabbix agent versions 5.0.0 to 5.0.39, 6.0.0 to 6.0.23, and 6.4.0 to 6.4.8, along with specific alpha versions.
CVE-2023-32726 is caused by improper checks for RDLENGTH that may lead to buffer overflow in responses from DNS servers.
CVE-2023-32726 is closely related to vulnerabilities dealing with DNS response handling and buffer overflow issues.