Revision Date: | 2013-12-18 | Version: | 1 | Title: | CVE-2013-6824 on Ubuntu 16.04 LTS (xenial) - medium. | Description: | Zabbix before 1.8.19rc1, 2.0 before 2.0.10rc1, and 2.2 before 2.2.1rc1 allows remote Zabbix servers and proxies to execute arbitrary commands via a newline in a flexible user parameter.
| Family: | unix | Class: | vulnerability | Status: | | Reference(s): | CVE-2013-6824
| Platform(s): | Ubuntu 16.04 LTS
| Product(s): | | Definition Synopsis | Ubuntu 16.04 LTS (xenial) is installed. AND Package Information
NOT zabbix-agent package in xenial, while related to the CVE in some way, is not affected.
OR NOT zabbix-frontend-php package in xenial, while related to the CVE in some way, is not affected.
OR NOT zabbix-java-gateway package in xenial, while related to the CVE in some way, is not affected.
OR NOT zabbix-proxy-mysql package in xenial, while related to the CVE in some way, is not affected.
OR NOT zabbix-proxy-pgsql package in xenial, while related to the CVE in some way, is not affected.
OR NOT zabbix-proxy-sqlite3 package in xenial, while related to the CVE in some way, is not affected.
OR NOT zabbix-server-mysql package in xenial, while related to the CVE in some way, is not affected.
OR NOT zabbix-server-pgsql package in xenial, while related to the CVE in some way, is not affected.
|
|