SB2017081209 - Debian update for zabbix



SB2017081209 - Debian update for zabbix

Published: August 12, 2017

Security Bulletin ID SB2017081209
Severity
High
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

High 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Command injection (CVE-ID: CVE-2017-2824)

The vulnerability allows a remote unauthenticated attacker to execute arbitrary code on a targeted system.

The weakness exists due to insufficient validation of user-supplied input by the trapper command function. An attacker can submitt specially crafted packets from an active Zabbix proxy, inject arbitrary commands and execute arbitrary code on the targeted system.

Successful exploitation of the vulnerability results in arbitrary code execution.

Proof-of-concept code demonstrating an exploit of this vulnerability is publicly available.

2) Improper input validation (CVE-ID: CVE-2017-2825)

The vulnerability allows a remote unauthenticated attacker to write arbitrary files on the target system.

The weakness exists in the trapper functionality due to insufficient validation of trapper packets. A remote attacker can submit specially crafted trapper packets, bypass database logic checks, perform man-in-the-middle attack between an active Zabbix proxy and the target Zabbix server, alter the trapper requests made between the Zabbix proxy and the target server and perform database writes.

Remediation

Install update from vendor's website.