Vulnerability Description
The NET_TCP_LISTEN function in net.c in Zabbix Agent before 1.6.7, when running on FreeBSD or Solaris, allows remote attackers to bypass the EnableRemoteCommands setting and execute arbitrary commands via shell metacharacters in the argument to net.tcp.listen. NOTE: this attack is limited to attacks from trusted IP addresses.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zabbix | Zabbix | <= 1.6.6 |
| Freebsd | Freebsd | All versions |
| Sun | Solaris | All versions |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/37740Vendor Advisory
- http://www.securityfocus.com/archive/1/508439
- http://www.vupen.com/english/advisories/2009/3514Vendor Advisory
- https://support.zabbix.com/browse/ZBX-1032Exploit
- http://secunia.com/advisories/37740Vendor Advisory
- http://www.securityfocus.com/archive/1/508439
- http://www.vupen.com/english/advisories/2009/3514Vendor Advisory
- https://support.zabbix.com/browse/ZBX-1032Exploit
FAQ
What is CVE-2009-4502?
CVE-2009-4502 is a vulnerability with a CVSS score of 9.3 (HIGH). The NET_TCP_LISTEN function in net.c in Zabbix Agent before 1.6.7, when running on FreeBSD or Solaris, allows remote attackers to bypass the EnableRemoteCommands setting and execute arbitrary commands...
How severe is CVE-2009-4502?
CVE-2009-4502 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-4502?
Check the references section above for vendor advisories and patch information. Affected products include: Zabbix Zabbix, Freebsd Freebsd, Sun Solaris.