Vulnerability Name: | CVE-2009-4502 (CCN-54728) | ||||||||
Assigned: | 2009-12-14 | ||||||||
Published: | 2009-12-14 | ||||||||
Updated: | 2010-01-01 | ||||||||
Summary: | The NET_TCP_LISTEN function in net.c in Zabbix Agent before 1.6.7, when running on FreeBSD or Solaris, allows remote attackers to bypass the EnableRemoteCommands setting and execute arbitrary commands via shell metacharacters in the argument to net.tcp.listen. Note: this attack is limited to attacks from trusted IP addresses. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 8.1 High (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:H/RL:OF/RC:C)
6.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-264 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2009-4502 Source: CCN Type: SA37740 ZABBIX Multiple Vulnerabilities Source: SECUNIA Type: Vendor Advisory 37740 Source: CCN Type: OSVDB ID: 60956 Zabbix Agent net.tcp.listen NET_TCP_LISTEN Function Remote Code Execution Source: BUGTRAQ Type: UNKNOWN 20091213 Zabbix Agent : Bypass of EnableRemoteCommands=0 Source: CCN Type: BID-37306 ZABBIX 'NET_TCP_LISTEN()' Security Bypass Vulnerability Source: VUPEN Type: Vendor Advisory ADV-2009-3514 Source: CCN Type: ZABBIX Web site ZABBIX Source: XF Type: UNKNOWN zabbix-enableremotecommands-cmd-execution(54728) Source: CCN Type: ZBX-1032 Bypassing EnableRemoteCommands=0 in Zabbix Client Source: CONFIRM Type: Exploit https://support.zabbix.com/browse/ZBX-1032 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [12-14-2009] | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |