The NET_TCP_LISTEN function in net.c in Zabbix Agent before 1.6.7, when running on FreeBSD or Solaris, allows remote attackers to bypass the EnableRemoteCommands setting and execute arbitrary commands via shell metacharacters in the argument to net.tcp.listen. NOTE: this attack is limited to attacks from trusted IP addresses.
References
Link | Resource |
---|---|
http://secunia.com/advisories/37740 | Vendor Advisory |
http://www.securityfocus.com/archive/1/508439 | |
http://www.vupen.com/english/advisories/2009/3514 | Vendor Advisory |
https://support.zabbix.com/browse/ZBX-1032 | Exploit |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-10-03T16:24:04
Updated: 2022-10-03T16:24:04
Reserved: 2022-10-03T00:00:00
Link: CVE-2009-4502
JSON object: View
NVD Information
Status : Analyzed
Published: 2009-12-31T18:30:01.797
Modified: 2010-01-01T05:00:00.000
Link: CVE-2009-4502
JSON object: View
Redhat Information
No data.
CWE