Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v6qg-5p9x-9hh9

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The NET_TCP_LISTEN function in net.c in Zabbix Agent before 1.6.7, when running on FreeBSD or Solaris, allows remote attackers to bypass the EnableRemoteCommands setting and execute arbitrary commands via shell metacharacters in the argument to net.tcp.listen. NOTE: this attack is limited to attacks from trusted IP addresses.

The NET_TCP_LISTEN function in net.c in Zabbix Agent before 1.6.7, when running on FreeBSD or Solaris, allows remote attackers to bypass the EnableRemoteCommands setting and execute arbitrary commands via shell metacharacters in the argument to net.tcp.listen. NOTE: this attack is limited to attacks from trusted IP addresses.

EPSS

Процентиль: 98%
0.64138
Средний

Связанные уязвимости

ubuntu
почти 16 лет назад

The NET_TCP_LISTEN function in net.c in Zabbix Agent before 1.6.7, when running on FreeBSD or Solaris, allows remote attackers to bypass the EnableRemoteCommands setting and execute arbitrary commands via shell metacharacters in the argument to net.tcp.listen. NOTE: this attack is limited to attacks from trusted IP addresses.

nvd
почти 16 лет назад

The NET_TCP_LISTEN function in net.c in Zabbix Agent before 1.6.7, when running on FreeBSD or Solaris, allows remote attackers to bypass the EnableRemoteCommands setting and execute arbitrary commands via shell metacharacters in the argument to net.tcp.listen. NOTE: this attack is limited to attacks from trusted IP addresses.

debian
почти 16 лет назад

The NET_TCP_LISTEN function in net.c in Zabbix Agent before 1.6.7, whe ...

EPSS

Процентиль: 98%
0.64138
Средний