2.1
CVSSv2

CVE-2007-6210

Published: 04/12/2007 Updated: 05/09/2008
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 215
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

zabbix_agentd 1.1.4 in ZABBIX prior to 1.4.3 runs "UserParameter" scripts with gid 0, which might allow local users to gain privileges.

Vulnerable Product Search on Vulmon Subscribe to Product

zabbix zabbix agentd 1.1.4

Vendor Advisories

Debian Bug report logs - #452682 zabbix-agent runs as user 'zabbix' with gid=0 (root), configuring additional groups doesn't work Package: zabbix-agent; Maintainer for zabbix-agent is Dmitry Smirnov <onlyjob@debianorg>; Source for zabbix-agent is src:zabbix (PTS, buildd, popcon) Reported by: Bas van Schaik <bas@tuxesnl& ...
Bas van Schaik discovered that the agentd process of Zabbix, a network monitor system, may run user-supplied commands as group id root, not zabbix, which may lead to a privilege escalation zabbix is not included in the oldstable distribution (sarge) For the stable distribution (etch), this problem has been fixed in version 1:114-10etch1 ...

Exploits

#include <sys/typesh> #include <unistdh> #include <pwdh> #include <stdioh> int main() { struct passwd *pw; pw = getpwnam("abi"); FILE *pipe; char buf[25]; setgid(pw->pw_gid); setuid(pw->pw_uid); printf("my gid: %d\n", getegid()); printf("my uid: %d\n", getuid()); pip ...