CVE-2017-2825
Published: 20 April 2018
In the trapper functionality of Zabbix Server 2.4.x, specifically crafted trapper packets can pass database logic checks, resulting in database writes. An attacker can set up a Man-in-the-Middle server to alter trapper requests made between an active Zabbix proxy and Server to trigger this vulnerability.
From the Ubuntu Security Team
It was discovered that Zabbix incorrectly handled certain requests. A remote attacker could possibly use this issue to execute arbitrary code.
Priority
Status
Package | Release | Status |
---|---|---|
zabbix Launchpad, Ubuntu, Debian |
artful |
Not vulnerable
(1:3.0.7+dfsg-3)
|
bionic |
Not vulnerable
(1:3.0.7+dfsg-3)
|
|
cosmic |
Not vulnerable
(1:3.0.7+dfsg-3)
|
|
disco |
Not vulnerable
(1:3.0.7+dfsg-3)
|
|
eoan |
Not vulnerable
(1:3.0.7+dfsg-3)
|
|
focal |
Not vulnerable
(1:3.0.7+dfsg-3)
|
|
groovy |
Not vulnerable
(1:3.0.7+dfsg-3)
|
|
hirsute |
Not vulnerable
(1:3.0.7+dfsg-3)
|
|
impish |
Not vulnerable
(1:3.0.7+dfsg-3)
|
|
jammy |
Not vulnerable
(1:3.0.7+dfsg-3)
|
|
upstream |
Released
(1:3.0.7+dfsg-3)
|
|
yakkety |
Ignored
(end of life)
|
|
zesty |
Ignored
(end of life)
|
|
trusty |
Released
(1:2.2.2+dfsg-1ubuntu1+esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only) |
|
xenial |
Released
(1:2.4.7+dfsg-2ubuntu2.1+esm1)
Available with Ubuntu Pro |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.0 |
Attack vector | Network |
Attack complexity | High |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | Low |
Integrity impact | High |
Availability impact | Low |
Vector | CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L |