Vulnerability Description
The zbx_get_next_field function in libs/zbxcommon/str.c in Zabbix Server before 1.6.8 allows remote attackers to cause a denial of service (crash) via a request that lacks expected separators, which triggers a NULL pointer dereference, as demonstrated using the Command keyword.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zabbix | Zabbix | <= 1.6.7 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/37740Vendor Advisory
- http://www.securityfocus.com/archive/1/508436/30/60/threadedPatch
- http://www.vupen.com/english/advisories/2009/3514Vendor Advisory
- https://support.zabbix.com/browse/ZBX-1355
- http://secunia.com/advisories/37740Vendor Advisory
- http://www.securityfocus.com/archive/1/508436/30/60/threadedPatch
- http://www.vupen.com/english/advisories/2009/3514Vendor Advisory
- https://support.zabbix.com/browse/ZBX-1355
FAQ
What is CVE-2009-4501?
CVE-2009-4501 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The zbx_get_next_field function in libs/zbxcommon/str.c in Zabbix Server before 1.6.8 allows remote attackers to cause a denial of service (crash) via a request that lacks expected separators, which t...
How severe is CVE-2009-4501?
CVE-2009-4501 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-4501?
Check the references section above for vendor advisories and patch information. Affected products include: Zabbix Zabbix.