Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in Zabbix
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in Zabbix
ID: FEDORA-2013-22741
Distribution: Fedora
Plattformen: Fedora 20
Datum: Sa, 14. Dezember 2013, 10:27
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6824
Applikationen: Zabbix

Originalnachricht

Name        : zabbix
Product : Fedora 20
Version : 2.0.9
Release : 2.fc20
URL : http://www.zabbix.com
Summary : Open-source monitoring solution for your IT infrastructure
Description :
Zabbix is software that monitors numerous parameters of a network and the
health and integrity of servers. Zabbix uses a flexible notification mechanism
that allows users to configure e-mail based alerts for virtually any event.
This allows a fast reaction to server problems. Zabbix offers excellent
reporting and data visualization features based on the stored data.
This makes Zabbix ideal for capacity planning.

Zabbix supports both polling and trapping. All Zabbix reports and statistics,
as well as configuration parameters are accessed through a web-based front end.
A web-based front end ensures that the status of your network and the health of
your servers can be assessed from any location. Properly configured, Zabbix can
play an important role in monitoring IT infrastructure. This is equally true
for small organizations with a few servers and for large companies with a
multitude of servers.

-------------------------------------------------------------------------------
-
Update Information:

This update solves the vulnerability described in CVE-2013-6824:

"Zabbix agent is vulnerable to remote command execution from the Zabbix
server in some cases"

https://support.zabbix.com/browse/ZBX-7479
-------------------------------------------------------------------------------
-
ChangeLog:

* Sun Nov 3 2013 Volker Fröhlich <volker27@gmx.at> - 2.0.9-2
- Fix vulnerability for remote command execution injection
(ZBX-7479, CVE-2013-6824)
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1037943 - CVE-2013-6824 zabbix: remote command execution from
zabbix server [epel-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1037943
[ 2 ] Bug #1037942 - CVE-2013-6824 zabbix: remote command execution from
zabbix server [fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=1037942
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update zabbix' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Gewinnspiel
Neue Nachrichten
Werbung