SB2017062325 - Fedora 26 update for zabbix 



SB2017062325 - Fedora 26 update for zabbix

Published: June 23, 2017 Updated: April 24, 2025

Security Bulletin ID SB2017062325
Severity
High
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Command injection (CVE-ID: CVE-2017-2824)

The vulnerability allows a remote unauthenticated attacker to execute arbitrary code on a targeted system.

The weakness exists due to insufficient validation of user-supplied input by the trapper command function. An attacker can submitt specially crafted packets from an active Zabbix proxy, inject arbitrary commands and execute arbitrary code on the targeted system.

Successful exploitation of the vulnerability results in arbitrary code execution.

Proof-of-concept code demonstrating an exploit of this vulnerability is publicly available.

Remediation

Install update from vendor's website.