diff options
author | delphij <delphij@FreeBSD.org> | 2013-12-16 12:11:00 +0800 |
---|---|---|
committer | delphij <delphij@FreeBSD.org> | 2013-12-16 12:11:00 +0800 |
commit | f2ebb5ed6d6c96fd760ff317832ae36f5b84c42d (patch) | |
tree | 8f30e6b9ada11c76657c2835d7ee8a385c2d72f2 | |
parent | 2d5ae5ed403ed4f3dd0882e2ceda93db7c2cd925 (diff) | |
download | freebsd-ports-gnome-f2ebb5ed6d6c96fd760ff317832ae36f5b84c42d.tar.gz freebsd-ports-gnome-f2ebb5ed6d6c96fd760ff317832ae36f5b84c42d.tar.zst freebsd-ports-gnome-f2ebb5ed6d6c96fd760ff317832ae36f5b84c42d.zip |
Document Zabbix agent remote command execution vulnerability.
-rw-r--r-- | security/vuxml/vuln.xml | 27 |
1 files changed, 27 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index f541f0f15c1a..a06d1c1e0426 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -51,6 +51,33 @@ Note: Please add new entries to the beginning of this file. --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="44d0f8dc-6607-11e3-bb11-0025900931f8"> + <topic>zabbix -- shell command injection vulnerability</topic> + <affects> + <package> + <name>zabbix2-agent</name> + <range><lt>2.0.10</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Recurity Labs Team project reports:</p> + <blockquote cite="https://support.zabbix.com/browse/ZBX-7479"> + <p>Zabbix agent is vulnerable to remote command execution + from the Zabbix server in some cases.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2013-6824</cvename> + <url>https://support.zabbix.com/browse/ZBX-7479</url> + </references> + <dates> + <discovery>2013-12-03</discovery> + <entry>2013-12-16</entry> + </dates> + </vuln> + <vuln vid="47b4e713-6513-11e3-868f-0025905a4771"> <topic>PHP5 -- memory corruption in openssl_x509_parse()</topic> <affects> |