ID

VAR-201208-0374


CVE

CVE-2012-3435


TITLE

ZABBIX 'itemid' parameter SQL injection vulnerability

Trust: 0.9

sources: CNVD: CNVD-2012-3918 // BID: 54661

DESCRIPTION

SQL injection vulnerability in frontends/php/popup_bitem.php in Zabbix 1.8.15rc1 and earlier, and 2.x before 2.0.2rc1, allows remote attackers to execute arbitrary SQL commands via the itemid parameter. Zabbix is an enterprise-class open source solution that provides distributed system monitoring and network monitoring based on a web interface. ZABBIX is prone to an SQL-injection vulnerability. A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. Versions prior to ZABBIX 2.0.2 are vulnerable. ---------------------------------------------------------------------- We are millions! Join us to protect all Pc's Worldwide. Download the new Secunia PSI 3.0 available in 5 languages and share it with your friends: http://secunia.com/psi ---------------------------------------------------------------------- TITLE: Zabbix "itemid" SQL Injection Vulnerability SECUNIA ADVISORY ID: SA49809 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49809/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49809 RELEASE DATE: 2012-07-25 DISCUSS ADVISORY: http://secunia.com/advisories/49809/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/49809/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=49809 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in Zabbix, which can be exploited by malicious people to conduct SQL injection attacks. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. The vulnerability is reported in version 2.0.1. SOLUTION: Fixed in version 2.0.2rc2. Also fixed in the GIT repository. PROVIDED AND/OR DISCOVERED BY: muts ORIGINAL ADVISORY: Zabbix: https://support.zabbix.com/browse/ZBX-5348 http://git.zabbixzone.com/zabbix2.0/.git/commit/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54 muts: http://www.exploit-db.com/exploits/20087/ OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . ---------------------------------------------------------------------- The final version of the CSI 6.0 has been released. For more information: SA49809 SOLUTION: Apply updated packages via the apt-get package manager. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------- Debian Security Advisory DSA-2539-1 security@debian.org http://www.debian.org/security/ Raphael Geissert September 06, 2012 http://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : zabbix Vulnerability : SQL injection Problem type : remote Debian-specific: no CVE ID : CVE-2012-3435 Debian Bug : 683273 It was discovered that Zabbix, a network monitoring solution, does not properly validate user input used as a part of an SQL query. For the testing distribution (wheezy), this problem will be fixed soon. We recommend that you upgrade your zabbix packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iEYEARECAAYFAlBIX7AACgkQYy49rUbZzlrfKwCdGUAYYsmuSFcaKKjgaap5PmSg Yj4AoJ6SogKTB06ZEoEwxkCAhGv7XIvO =lWI6 -----END PGP SIGNATURE----- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201311-15 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - http://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Normal Title: Zabbix: Multiple vulnerabilities Date: November 25, 2013 Bugs: #312875, #394497, #428372, #452878, #486696 ID: 201311-15 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been found in Zabbix, possibly leading to SQL injection attacks, Denial of Service, or information disclosure. Background ========== Zabbix is software for monitoring applications, networks, and servers. Affected packages ================= ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 net-analyzer/zabbix < 2.0.9_rc1-r2 >= 2.0.9_rc1-r2 Description =========== Multiple vulnerabilities have been discovered in Zabbix. Please review the CVE identifiers referenced below for details. Impact ====== A remote attacker may be able to execute arbitrary SQL statements, cause a Denial of Service condition, or obtain sensitive information. Workaround ========== There is no known workaround at this time. Resolution ========== All Zabbix users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot -v ">=net-analyzer/zabbix-2.0.9_rc1-r2" References ========== [ 1 ] CVE-2010-1277 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1277 [ 2 ] CVE-2011-2904 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2904 [ 3 ] CVE-2011-3263 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3263 [ 4 ] CVE-2011-4674 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4674 [ 5 ] CVE-2012-3435 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3435 [ 6 ] CVE-2013-1364 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1364 [ 7 ] CVE-2013-5572 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5572 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: http://security.gentoo.org/glsa/glsa-201311-15.xml Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2013 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. http://creativecommons.org/licenses/by-sa/2.5

Trust: 2.97

sources: NVD: CVE-2012-3435 // JVNDB: JVNDB-2012-003708 // CNVD: CNVD-2012-3918 // BID: 54661 // IVD: d67c7e64-1f5e-11e6-abef-000c29c66e3d // PACKETSTORM: 114993 // PACKETSTORM: 116281 // PACKETSTORM: 116311 // PACKETSTORM: 124173

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: d67c7e64-1f5e-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-3918

AFFECTED PRODUCTS

vendor:zabbixmodel: - scope:eqversion:1.1

Trust: 2.4

vendor:zabbixmodel:zabbixscope:eqversion:1.1

Trust: 1.6

vendor:zabbixmodel:zabbixscope:eqversion:1.7.2

Trust: 1.6

vendor:zabbixmodel:zabbixscope:eqversion:1.7.3

Trust: 1.6

vendor:zabbixmodel:zabbixscope:eqversion:1.6.7

Trust: 1.6

vendor:zabbixmodel:zabbixscope:eqversion:1.6.8

Trust: 1.6

vendor:zabbixmodel:zabbixscope:eqversion:1.7.4

Trust: 1.6

vendor:zabbixmodel: - scope:eqversion:2.0.0

Trust: 1.4

vendor:zabbixmodel:zabbixscope:eqversion:2.0.1

Trust: 1.3

vendor:zabbixmodel:zabbixscope:eqversion:1.3.3

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.5.1

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.3.8

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.4.5

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.3.4

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.1.2

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.3.1

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.6.2

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.5.3

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.6.9

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.8.3

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.1.3

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.4.2

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.1.5

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.3.2

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.6

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.1.1

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.4.6

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.3.5

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.7.1

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.1.4

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.3.7

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.8.1

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.1.7

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.4.3

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:2.0.0

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.6.4

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.6.5

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.3.6

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.5.2

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.1.6

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.7

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.3

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.6.3

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.5

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.6.6

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.6.1

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.8.2

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.8

Trust: 1.0

vendor:zabbixmodel:zabbixscope:lteversion:1.8.15

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.4.4

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.5.4

Trust: 1.0

vendor:zabbixmodel:zabbixscope:eqversion:1.8.4

Trust: 0.9

vendor:zabbixmodel:zabbixscope:eqversion:1.8.6

Trust: 0.9

vendor:zabbixmodel:zabbixscope:eqversion:1.8.7

Trust: 0.9

vendor:zabbixmodel:zabbixscope:eqversion:1.8.9

Trust: 0.9

vendor:zabbixmodel:zabbixscope:eqversion:1.8.5

Trust: 0.9

vendor:zabbixmodel:zabbixscope:eqversion:2.0.2rc1

Trust: 0.8

vendor:zabbixmodel:zabbixscope:ltversion:2.x

Trust: 0.8

vendor:zabbixmodel:zabbixscope:lteversion:1.8.15rc1 and earlier

Trust: 0.8

vendor:zabbixmodel: - scope:eqversion:1.8.3

Trust: 0.6

vendor:zabbixmodel: - scope:eqversion:2.0.1

Trust: 0.6

vendor:zabbixmodel:zabbixscope:eqversion:2.0

Trust: 0.3

vendor:redhatmodel:fedora epelscope:eqversion:6

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:zabbixmodel:zabbixscope:neversion:2.0.2

Trust: 0.3

vendor:zabbixmodel: - scope:eqversion:1.1.1

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.1.2

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.1.3

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.1.4

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.1.5

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.1.6

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.1.7

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.3

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.3.1

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.3.2

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.3.3

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.3.4

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.3.5

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.3.6

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.3.7

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.3.8

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.4.2

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.4.3

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.4.4

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.4.5

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.4.6

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.5

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.5.1

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.5.2

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.5.3

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.5.4

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.6

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.6.1

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.6.2

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.6.3

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.6.4

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.6.5

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.6.6

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.6.7

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.6.8

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.6.9

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.7

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.7.1

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.7.2

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.7.3

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.7.4

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.8

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.8.1

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:1.8.2

Trust: 0.2

vendor:zabbixmodel: - scope:eqversion:*

Trust: 0.2

sources: IVD: d67c7e64-1f5e-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-3918 // BID: 54661 // JVNDB: JVNDB-2012-003708 // CNNVD: CNNVD-201207-600 // NVD: CVE-2012-3435

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-3435
value: HIGH

Trust: 1.0

NVD: CVE-2012-3435
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201207-600
value: HIGH

Trust: 0.6

IVD: d67c7e64-1f5e-11e6-abef-000c29c66e3d
value: HIGH

Trust: 0.2

nvd@nist.gov: CVE-2012-3435
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: d67c7e64-1f5e-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: d67c7e64-1f5e-11e6-abef-000c29c66e3d // JVNDB: JVNDB-2012-003708 // CNNVD: CNNVD-201207-600 // NVD: CVE-2012-3435

PROBLEMTYPE DATA

problemtype:CWE-89

Trust: 1.8

sources: JVNDB: JVNDB-2012-003708 // NVD: CVE-2012-3435

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201207-600

TYPE

SQL injection

Trust: 1.0

sources: IVD: d67c7e64-1f5e-11e6-abef-000c29c66e3d // PACKETSTORM: 114993 // PACKETSTORM: 116281 // CNNVD: CNNVD-201207-600

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-003708

PATCH

title:DSA-2539url:http://www.debian.org/security/2012/dsa-2539

Trust: 0.8

title:zabbix2.0/.git/commitdiffurl:http://git.zabbixzone.com/zabbix2.0/.git/commitdiff/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54

Trust: 0.8

title:ZBX-5348url:https://support.zabbix.com/browse/ZBX-5348

Trust: 0.8

title:ZABBIX 'itemid' parameter SQL injection vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/19262

Trust: 0.6

title:zabbix-2.0.2url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=44036

Trust: 0.6

sources: CNVD: CNVD-2012-3918 // JVNDB: JVNDB-2012-003708 // CNNVD: CNNVD-201207-600

EXTERNAL IDS

db:NVDid:CVE-2012-3435

Trust: 3.1

db:BIDid:54661

Trust: 2.5

db:SECUNIAid:49809

Trust: 1.8

db:EXPLOIT-DBid:20087

Trust: 1.7

db:OSVDBid:84127

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2012/07/28/3

Trust: 1.6

db:OPENWALLid:OSS-SECURITY/2012/07/27/6

Trust: 1.6

db:SECUNIAid:50475

Trust: 1.1

db:CNVDid:CNVD-2012-3918

Trust: 0.8

db:CNNVDid:CNNVD-201207-600

Trust: 0.8

db:JVNDBid:JVNDB-2012-003708

Trust: 0.8

db:XFid:77195

Trust: 0.6

db:MLISTid:[OSS-SECURITY] 20120727 ZABBIX SQL INJECTION FLAW (CVE REQUEST)

Trust: 0.6

db:MLISTid:[OSS-SECURITY] 20120728 RE: ZABBIX SQL INJECTION FLAW (CVE REQUEST)

Trust: 0.6

db:IVDid:D67C7E64-1F5E-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:PACKETSTORMid:114993

Trust: 0.1

db:PACKETSTORMid:116281

Trust: 0.1

db:PACKETSTORMid:116311

Trust: 0.1

db:PACKETSTORMid:124173

Trust: 0.1

sources: IVD: d67c7e64-1f5e-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-3918 // BID: 54661 // JVNDB: JVNDB-2012-003708 // PACKETSTORM: 114993 // PACKETSTORM: 116281 // PACKETSTORM: 116311 // PACKETSTORM: 124173 // CNNVD: CNNVD-201207-600 // NVD: CVE-2012-3435

REFERENCES

url:https://support.zabbix.com/browse/zbx-5348

Trust: 2.0

url:http://www.securityfocus.com/bid/54661

Trust: 1.6

url:http://www.openwall.com/lists/oss-security/2012/07/28/3

Trust: 1.6

url:http://www.openwall.com/lists/oss-security/2012/07/27/6

Trust: 1.6

url:http://www.exploit-db.com/exploits/20087

Trust: 1.6

url:http://secunia.com/advisories/49809

Trust: 1.6

url:http://osvdb.org/84127

Trust: 1.6

url:http://git.zabbixzone.com/zabbix2.0/.git/commitdiff/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54

Trust: 1.6

url:http://secunia.com/advisories/50475

Trust: 1.0

url:http://www.debian.org/security/2012/dsa-2539

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/77195

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3435

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3435

Trust: 0.8

url:http://git.zabbixzone.com/zabbix2.0/.git/commit/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54http

Trust: 0.6

url:https://bugzilla.redhat.com/show_bug.cgi?id=843927

Trust: 0.6

url:http://xforce.iss.net/xforce/xfdb/77195

Trust: 0.6

url:http://www.zabbix.com/rn2.0.1.php

Trust: 0.3

url:http://www.zabbix.com/

Trust: 0.3

url:https://bugzilla.redhat.com/show_bug.cgi?id=843928

Trust: 0.3

url:https://bugzilla.redhat.com/show_bug.cgi?id=843929

Trust: 0.3

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.2

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2012-3435

Trust: 0.2

url:http://secunia.com/psi

Trust: 0.1

url:http://www.exploit-db.com/exploits/20087/

Trust: 0.1

url:http://secunia.com/advisories/49809/

Trust: 0.1

url:http://secunia.com/advisories/49809/#comments

Trust: 0.1

url:http://git.zabbixzone.com/zabbix2.0/.git/commit/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=49809

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=50475

Trust: 0.1

url:http://secunia.com/blog/325/

Trust: 0.1

url:http://secunia.com/advisories/50475/

Trust: 0.1

url:http://lists.debian.org/debian-security-announce/2012/msg00180.html

Trust: 0.1

url:http://secunia.com/advisories/50475/#comments

Trust: 0.1

url:http://www.debian.org/security/faq

Trust: 0.1

url:http://www.debian.org/security/

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1277

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-4674

Trust: 0.1

url:http://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5572

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3263

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3435

Trust: 0.1

url:http://security.gentoo.org/glsa/glsa-201311-15.xml

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1364

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-3263

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-1364

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2013-5572

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4674

Trust: 0.1

url:http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2904

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2010-1277

Trust: 0.1

url:http://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2011-2904

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

sources: CNVD: CNVD-2012-3918 // BID: 54661 // JVNDB: JVNDB-2012-003708 // PACKETSTORM: 114993 // PACKETSTORM: 116281 // PACKETSTORM: 116311 // PACKETSTORM: 124173 // CNNVD: CNNVD-201207-600 // NVD: CVE-2012-3435

CREDITS

muts

Trust: 0.9

sources: BID: 54661 // CNNVD: CNNVD-201207-600

SOURCES

db:IVDid:d67c7e64-1f5e-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2012-3918
db:BIDid:54661
db:JVNDBid:JVNDB-2012-003708
db:PACKETSTORMid:114993
db:PACKETSTORMid:116281
db:PACKETSTORMid:116311
db:PACKETSTORMid:124173
db:CNNVDid:CNNVD-201207-600
db:NVDid:CVE-2012-3435

LAST UPDATE DATE

2024-08-14T13:58:48.731000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-3918date:2012-07-27T00:00:00
db:BIDid:54661date:2015-04-13T22:08:00
db:JVNDBid:JVNDB-2012-003708date:2012-11-15T00:00:00
db:CNNVDid:CNNVD-201207-600date:2012-08-01T00:00:00
db:NVDid:CVE-2012-3435date:2017-08-29T01:31:55.417

SOURCES RELEASE DATE

db:IVDid:d67c7e64-1f5e-11e6-abef-000c29c66e3ddate:2012-07-27T00:00:00
db:CNVDid:CNVD-2012-3918date:2012-07-27T00:00:00
db:BIDid:54661date:2012-07-24T00:00:00
db:JVNDBid:JVNDB-2012-003708date:2012-08-20T00:00:00
db:PACKETSTORMid:114993date:2012-07-25T04:55:22
db:PACKETSTORMid:116281date:2012-09-06T06:37:52
db:PACKETSTORMid:116311date:2012-09-07T03:06:39
db:PACKETSTORMid:124173date:2013-11-25T23:55:55
db:CNNVDid:CNNVD-201207-600date:2012-07-24T00:00:00
db:NVDid:CVE-2012-3435date:2012-08-15T20:55:03.070