Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-2824

Опубликовано: 24 мая 2017
Источник: ubuntu
Приоритет: high
CVSS2: 6.8
CVSS3: 8.1

Описание

An exploitable code execution vulnerability exists in the trapper command functionality of Zabbix Server 2.4.X. A specially crafted set of packets can cause a command injection resulting in remote code execution. An attacker can make requests from an active Zabbix Proxy to trigger this vulnerability.

РелизСтатусПримечание
artful

not-affected

1:3.0.7+dfsg-3
bionic

not-affected

1:3.0.7+dfsg-3
cosmic

not-affected

1:3.0.7+dfsg-3
devel

not-affected

1:3.0.7+dfsg-3
disco

not-affected

1:3.0.7+dfsg-3
eoan

not-affected

1:3.0.7+dfsg-3
esm-apps/bionic

not-affected

1:3.0.7+dfsg-3
esm-apps/focal

not-affected

1:3.0.7+dfsg-3
esm-apps/jammy

not-affected

1:3.0.7+dfsg-3
esm-apps/xenial

released

1:2.4.7+dfsg-2ubuntu2.1+esm1

Показывать по

6.8 Medium

CVSS2

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
nvd
больше 8 лет назад

An exploitable code execution vulnerability exists in the trapper command functionality of Zabbix Server 2.4.X. A specially crafted set of packets can cause a command injection resulting in remote code execution. An attacker can make requests from an active Zabbix Proxy to trigger this vulnerability.

CVSS3: 8.1
debian
больше 8 лет назад

An exploitable code execution vulnerability exists in the trapper comm ...

CVSS3: 8.1
github
больше 3 лет назад

An exploitable code execution vulnerability exists in the trapper command functionality of Zabbix Server 2.4.X. A specially crafted set of packets can cause a command injection resulting in remote code execution. An attacker can make requests from an active Zabbix Proxy to trigger this vulnerability.

6.8 Medium

CVSS2

8.1 High

CVSS3