Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*", "matchCriteriaId": "44AC67DF-D478-4D13-939C-B3659CEC41F1", "versionEndIncluding": "1.6.6", "vulnerable": true}, {"criteria": "cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "B0FB47B1-330E-4ED4-A4AF-993DC613B782", "vulnerable": true}, {"criteria": "cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "FA7AA37E-2E1A-471D-95AE-83A2CABF1DF5", "vulnerable": true}, {"criteria": "cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "DFABFF16-FD5E-4FCF-BDF8-AE8D654CEAD4", "vulnerable": true}, {"criteria": "cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "03E211F0-2F61-4503-AE89-0F750C2848B5", "vulnerable": true}, {"criteria": "cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "55BC3D41-DB27-4509-8908-0A7F0A19206E", "vulnerable": true}, {"criteria": "cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "96A266AD-7853-40D0-8D1B-6ECFF34A76AA", "vulnerable": true}, {"criteria": "cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "BB1611DD-8EB1-49FE-8995-C9D853F812F3", "vulnerable": true}, {"criteria": "cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "8C27222F-3FA6-4F9A-A017-37B77E536CFF", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9EC02F3-3905-460D-8949-3B26394215CA", "vulnerable": false}, {"criteria": "cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*", "matchCriteriaId": "469B74F2-4B89-42B8-8638-731E92D463B9", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The NET_TCP_LISTEN function in net.c in Zabbix Agent before 1.6.7, when running on FreeBSD or Solaris, allows remote attackers to bypass the EnableRemoteCommands setting and execute arbitrary commands via shell metacharacters in the argument to net.tcp.listen. NOTE: this attack is limited to attacks from trusted IP addresses."}, {"lang": "es", "value": "La funci\u00f3n NET_TCP_LISTEN en net.c en Zabbix Agent versiones anteriores a v1.6.7, cuando se ejecuta en FreeBSD o Solaris, permite a atacantes remotos eludir la asignaci\u00f3n de EnableRemoteCommands y ejecutar comandos de su elecci\u00f3n mediante metacaracteres del interprete de comandos en el argumento de net.tcp.listen. NOTA: este ataque est\u00e1 limitado a ser realizado desde direcciones IP de confianza."}], "id": "CVE-2009-4502", "lastModified": "2025-04-09T00:30:58.490", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2009-12-31T18:30:01.797", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/37740"}, {"source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/508439"}, {"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2009/3514"}, {"source": "cve@mitre.org", "tags": ["Exploit"], "url": "https://support.zabbix.com/browse/ZBX-1032"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://secunia.com/advisories/37740"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/508439"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.vupen.com/english/advisories/2009/3514"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Exploit"], "url": "https://support.zabbix.com/browse/ZBX-1032"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-264"}], "source": "nvd@nist.gov", "type": "Primary"}]}