In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade Debian:13
zabbix
to version 1:7.0.10+dfsg-1 or higher.
Note: Versions mentioned in the description apply only to the upstream zabbix
package and not the zabbix
package as distributed by Debian
.
See How to fix?
for Debian:13
relevant fixed versions and status.
Zabbix server is vulnerable to a DoS vulnerability due to uncontrolled resource exhaustion. An attacker can send specially crafted requests to the server, which will cause the server to allocate an excessive amount of memory and perform CPU-intensive decompression operations, ultimately leading to a service crash.