An exploitable code execution vulnerability exists in the trapper command functionality of Zabbix Server 2.4.X. A specially crafted set of packets can cause a command injection resulting in remote code execution. An attacker can make requests from an active Zabbix Proxy to trigger this vulnerability.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-3937-1 | zabbix security update |
Ubuntu USN |
USN-4767-1 | Zabbix vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2024-08-05T14:09:16.849Z
Reserved: 2016-12-01T00:00:00
Link: CVE-2017-2824
No data.
Status : Deferred
Published: 2017-05-24T14:29:00.707
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-2824
No data.
OpenCVE Enrichment
No data.
Debian DSA
Ubuntu USN