6.8
CVSSv2

CVE-2017-2825

Published: 20/04/2018 Updated: 03/10/2019
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 7 | Impact Score: 4.7 | Exploitability Score: 2.2
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

In the trapper functionality of Zabbix Server 2.4.x, specifically crafted trapper packets can pass database logic checks, resulting in database writes. An attacker can set up a Man-in-the-Middle server to alter trapper requests made between an active Zabbix proxy and Server to trigger this vulnerability.

Vulnerable Product Search on Vulmon Subscribe to Product

zabbix zabbix

debian debian linux 8.0

debian debian linux 9.0

Vendor Advisories

Debian Bug report logs - #863584 zabbix: CVE-2017-2824 CVE-2017-2825 Package: src:zabbix; Maintainer for src:zabbix is Dmitry Smirnov <onlyjob@debianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Sun, 28 May 2017 20:45:05 UTC Severity: grave Tags: security Found in version zabbix/1:227+dfsg-2 Fixed ...
Lilith Wyatt discovered two vulnerabilities in the Zabbix network monitoring system which may result in execution of arbitrary code or database writes by malicious proxies For the oldstable distribution (jessie), these problems have been fixed in version 1:227+dfsg-2+deb8u3 For the stable distribution (stretch), these problems have been fixed p ...