Summary: | net-analyzer/zabbix-frontend, net-analyzer/zabbix Multiple Vulnerabilities (CVE-2009-{4498,4499,4500,4501}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Robert Buchholz (RETIRED) <rbu> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | trivial | CC: | patrick, wschlich |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.ush.it/team/ush/hack-zabbix_162/adv.txt | ||
Whiteboard: | ~1 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Robert Buchholz (RETIRED)
![]() Although we only ship this in ~arch, can we put some focus on this bug? It allows for remote code execution. Adding net-analyze/zabbix[frontend] which ships the same code.. no idea why we have both split package and an "allround" package. Maybe we should consider masking this for now, as noone seems to actively maintain it currently? I'm using it myself, but I don't know if/when I'll have time to work on it. CVE-2009-4498 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4498): The node_process_command function in Zabbix Server before 1.8 allows remote attackers to execute arbitrary commands via a crafted request. CVE-2009-4499 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4499): SQL injection vulnerability in the get_history_lastid function in the nodewatcher component in Zabbix Server before 1.6.8 allows remote attackers to execute arbitrary SQL commands via a crafted request, possibly related to the send_history_last_id function in zabbix_server/trapper/nodehistory.c. CVE-2009-4500 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4500): The process_trap function in trapper/trapper.c in Zabbix Server before 1.6.6 allows remote attackers to cause a denial of service (crash) via a crafted request with data that lacks an expected : (colon) separator, which triggers a NULL pointer dereference. CVE-2009-4501 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4501): The zbx_get_next_field function in libs/zbxcommon/str.c in Zabbix Server before 1.6.8 allows remote attackers to cause a denial of service (crash) via a request that lacks expected separators, which triggers a NULL pointer dereference, as demonstrated using the Command keyword. CVE-2009-4502 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-4502): The NET_TCP_LISTEN function in net.c in Zabbix Agent before 1.6.7, when running on FreeBSD or Solaris, allows remote attackers to bypass the EnableRemoteCommands setting and execute arbitrary commands via shell metacharacters in the argument to net.tcp.listen. NOTE: this attack is limited to attacks from trusted IP addresses. # Patrick Lauer <patrick@gentoo.org> (09 Jan 2010) # Package has been unsplit, use net-analyzer/zabbix net-analyzer/zabbix-agent net-analyzer/zabbix-frontend net-analyzer/zabbix-server + 09 Jan 2010; Patrick Lauer <patrick@gentoo.org> -zabbix-1.4.6.ebuild, + -zabbix-1.6.5.ebuild, -zabbix-1.6.5-r1.ebuild, -zabbix-1.6.6.ebuild, + -zabbix-1.6.6-r1.ebuild: + Remove old That should bring all ebuilds to useful versions. Thanks! BTW: CVE-2009-4502 does not apply to us, removing. Closing noglsa. |