Milen Rangelov has discovered a vulnerability in ZABBIX, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to the improper implementation of the "vfs.file.cksum" command in "zabbix_agentd". This can be exploited to disable the processing of valid requests via multiple "vfs.file.cksum" commands, having e.g. "/dev/urandom" as a parameter, sent to the port on which "zabbix_agentd" is listening (port 10050/TCP by default). Successful exploitation requires that the malicious requests are sent from an authorized host. The vulnerability is confirmed in version 1.4.4. Other versions may also be affected.
See http://seclists.org/bugtraq/2008/Mar/0176.html
According to http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=471678 , this is fixed in 1.4.5. Closing: *zabbix-1.4.5 (29 Mar 2008) 29 Mar 2008; Wolfram Schlich <wschlich@gentoo.org> +files/1.4.5/init.d/zabbix-agentd, +files/1.4.5/init.d/zabbix-server, +files/1.4.5/postinstall-en.txt, +files/1.4.5/zabbix_agent.conf, +files/1.4.5/zabbix_agentd.conf, +files/1.4.5/zabbix_server.conf, +zabbix-1.4.5.ebuild: version bump