Vulnerability Description
Multiple buffer overflows in zabbix before 20061006 allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code via long strings to the (1) zabbix_log and (2) zabbix_syslog functions.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zabbix | Zabbix | 1.1.2 |
References
- http://bugs.debian.org/cgi-bin/bugreport.cgi/zabbix.security.patch?bug=391388%3B
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391388Exploit
- http://secunia.com/advisories/22313
- http://www.securityfocus.com/bid/20416
- http://www.vupen.com/english/advisories/2006/3959
- http://bugs.debian.org/cgi-bin/bugreport.cgi/zabbix.security.patch?bug=391388%3B
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391388Exploit
- http://secunia.com/advisories/22313
- http://www.securityfocus.com/bid/20416
- http://www.vupen.com/english/advisories/2006/3959
FAQ
What is CVE-2006-6693?
CVE-2006-6693 is a vulnerability with a CVSS score of 7.5 (HIGH). Multiple buffer overflows in zabbix before 20061006 allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code via long strings to the (1) zabbix_log and (2) ...
How severe is CVE-2006-6693?
CVE-2006-6693 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-6693?
Check the references section above for vendor advisories and patch information. Affected products include: Zabbix Zabbix.