Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2009-4501Improper Restriction of Operations within the Bounds of a Memory Buffer in Zabbix

Severity
5.0MEDIUMNVD
EPSS
4.6%
top 10.77%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedDec 31
Latest updateMay 2

Description

The zbx_get_next_field function in libs/zbxcommon/str.c in Zabbix Server before 1.6.8 allows remote attackers to cause a denial of service (crash) via a request that lacks expected separators, which triggers a NULL pointer dereference, as demonstrated using the Command keyword.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages3 packages

debiandebian/zabbix< zabbix 1:1.8-1 (bookworm)
Debianzabbix/zabbix< 1:1.8-1+3
NVDzabbix/zabbix1.6.7+9

Patches

🔴Vulnerability Details

2
GHSA
GHSA-m4jh-qvf3-23v6: The zbx_get_next_field function in libs/zbxcommon/str2022-05-02
OSV
CVE-2009-4501: The zbx_get_next_field function in libs/zbxcommon/str2009-12-31

💥Exploits & PoCs

1
Exploit-DB
Zabbix Server - Multiple Vulnerabilities2009-12-14

📋Vendor Advisories

1
Debian
CVE-2009-4501: zabbix - The zbx_get_next_field function in libs/zbxcommon/str.c in Zabbix Server before ...2009