CVE-2017-2825 Affecting zabbix package, versions <1:3.0.7+dfsg-3


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.2% (60th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN11-ZABBIX-522594
  • published20 Apr 2018
  • disclosed20 Apr 2018

Introduced: 20 Apr 2018

CVE-2017-2825  (opens in a new tab)

How to fix?

Upgrade Debian:11 zabbix to version 1:3.0.7+dfsg-3 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream zabbix package and not the zabbix package as distributed by Debian. See How to fix? for Debian:11 relevant fixed versions and status.

In the trapper functionality of Zabbix Server 2.4.x, specifically crafted trapper packets can pass database logic checks, resulting in database writes. An attacker can set up a Man-in-the-Middle server to alter trapper requests made between an active Zabbix proxy and Server to trigger this vulnerability.