Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 164993

Summary: net-analyzer/zabbix-server SNMP Buffer Overflow Vulnerability
Product: Gentoo Security Reporter: Executioner <keith>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: normal CC: wschlich
Priority: High    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://secunia.com/advisories/24020/
Whiteboard: B/C2 [noglsa] Falco
Package list:
Runtime testing required: ---

Description Executioner 2007-02-02 15:21:27 UTC
It doesn't specifically mention 1.1 but it probably couldn't hurt pumping up to 1.1.5 imho.

A vulnerability has been reported in ZABBIX, which can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system.

The vulnerability is caused due to a boundary error when processing SNMP responses. This can be exploited to cause a buffer overflow via a specially crafted SNMP packet containing an invalid IP address and may allow execution of arbitrary code.

Successful exploitation requires knowledge about a monitored SNMP device or SNMP daemon.

The vulnerability is reported in version 1.1.2, 1.1.3, and 1.1.4.

Solution:
Update to version 1.1.5.

Reproducible: Didn't try




http://www.zabbix.com/rn1.1.5.php
Comment 1 Wolfram Schlich (RETIRED) gentoo-dev 2007-02-12 01:01:05 UTC
Committed =net-analyzer/zabbix-{agent,frontend,server}-1.1.6.
I suppose zabbix-server is the relevant package.
Comment 2 Raphael Marichez (Falco) (RETIRED) gentoo-dev 2007-02-12 12:16:01 UTC
Thanks Wolfram, since there is no stable ebuild in any arch for zabbix-server, i close the bug. Feel free to reopen if you disagree.