drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in Zabbix
Name: |
Ausführen beliebiger Kommandos in Zabbix |
|
ID: |
FEDORA-2014-7603 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 19 |
|
Datum: |
Mo, 30. Juni 2014, 15:00 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3005 |
|
Applikationen: |
Zabbix |
|
Originalnachricht |
Name : zabbix Product : Fedora 19 Version : 2.0.12 Release : 3.fc19 URL : http://www.zabbix.com Summary : Open-source monitoring solution for your IT infrastructure Description : Zabbix is software that monitors numerous parameters of a network and the health and integrity of servers. Zabbix uses a flexible notification mechanism that allows users to configure e-mail based alerts for virtually any event. This allows a fast reaction to server problems. Zabbix offers excellent reporting and data visualization features based on the stored data. This makes Zabbix ideal for capacity planning.
Zabbix supports both polling and trapping. All Zabbix reports and statistics, as well as configuration parameters are accessed through a web-based front end. A web-based front end ensures that the status of your network and the health of your servers can be assessed from any location. Properly configured, Zabbix can play an important role in monitoring IT infrastructure. This is equally true for small organizations with a few servers and for large companies with a multitude of servers.
------------------------------------------------------------------------------- - Update Information:
Patch CVE-2014-3005 (local file inclusion via XXE attack)
https://support.zabbix.com/browse/ZBX-8151 ------------------------------------------------------------------------------- - ChangeLog:
* Fri Jun 20 2014 Volker Fröhlich <volker27@gmx.at> - 2.0.12-3 - Patch for ZBX-8151 (Local file inclusion via XXE attack) -- CVE-2014-3005 * Tue Jun 3 2014 Volker Fröhlich <volker27@gmx.at> - 2.0.12-2 - Patch for ZBX-8238 (logrt may continue reading an old file repeatedly) * Tue May 13 2014 Volker Fröhlich <volker27@gmx.at> - 2.0.12-1 - New upstream release * Tue Apr 22 2014 Volker Fröhlich <volker27@gmx.at> - 2.0.11-3 - Don't remove su directive from logrotate config in error - Adapt logrotate.in file and sed invocation from 2.2 packages * Sun Feb 16 2014 Volker Fröhlich <volker27@gmx.at> - 2.0.11-2 - Remove if clauses for Fedora/RHEL as they are obsolete in EL 7 - Use systemd scriplet macros (BZ#850378) - Remove init scripts * Wed Feb 12 2014 Volker Fröhlich <volker27@gmx.at> - 2.0.11-1 - New upstream release - Truncate changelog * Sun Dec 15 2013 Volker Fröhlich <volker27@gmx.at> - 2.0.10-2 - The start function of the proxy init script had a typo causing failure - Improved the section on running multiple instances in the README * Fri Dec 13 2013 Volker Fröhlich <volker27@gmx.at> - 2.0.10-1 - New upstream release - Drop obsolete patch ZBX-7479 - Improve init scripts to not kill other instances (BZ#1018293) - General overhaul of init scripts and documentation in README - Harmonize scriptlet if-clause style * Sun Nov 3 2013 Volker Fröhlich <volker27@gmx.at> - 2.0.9-2 - Fix vulnerability for remote command execution injection (ZBX-7479, CVE-2013-6824) * Wed Oct 9 2013 Volker Fröhlich <volker27@gmx.at> - 2.0.9-1 - New upstream release - Drop obsolete patches ZBX-6804, ZBX-7091, ZBX-6922, ZBX-6992 * Thu Oct 3 2013 Volker Fröhlich <volker27@gmx.at> - 2.0.8-3 - Add SQL speed-up patch (ZBX-6804) - Add SQL injection vulnerability patch (ZBX-7091, CVE-2013-5743) - Add patch for failing XML host import (ZBX-6922) * Fri Sep 13 2013 Volker Fröhlich <volker27@gmx.at> - 2.0.8-2 - Add php-ldap as a requirement for the frontend - Add patch for ZBX-6992 * Fri Aug 23 2013 Volker Fröhlich <volker27@gmx.at> - 2.0.8-1 - New upstream release - Create and configure a spooling directory for fping files outside of /tmp - Update README to reflect that and add a SELinux section - Drop PrivateTmp from systemd unit files - Drop patch for ZBX-6526 (solved upstream) - Drop patch for CVE-2012-6086 (solved upstream) - Correct path for the flash applet when removing - Truncate changelog * Tue Jul 30 2013 Volker Fröhlich <volker27@gmx.at> - 2.0.6-3 - Backport fix for CVE-2012-6086 ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #1110496 - CVE-2014-3005 zabbix: local file inclusion via XXE attack https://bugzilla.redhat.com/show_bug.cgi?id=1110496 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update zabbix' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|