In the trapper functionality of Zabbix Server 2.4.x, specifically crafted trapper packets can pass database logic checks, resulting in database writes. An attacker can set up a Man-in-the-Middle server to alter trapper requests made between an active Zabbix proxy and Server to trigger this vulnerability.
{
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "1:2.2.2+dfsg-1ubuntu1+esm1",
"binary_name": "zabbix-agent"
},
{
"binary_version": "1:2.2.2+dfsg-1ubuntu1+esm1",
"binary_name": "zabbix-frontend-php"
},
{
"binary_version": "1:2.2.2+dfsg-1ubuntu1+esm1",
"binary_name": "zabbix-java-gateway"
},
{
"binary_version": "1:2.2.2+dfsg-1ubuntu1+esm1",
"binary_name": "zabbix-proxy-mysql"
},
{
"binary_version": "1:2.2.2+dfsg-1ubuntu1+esm1",
"binary_name": "zabbix-proxy-pgsql"
},
{
"binary_version": "1:2.2.2+dfsg-1ubuntu1+esm1",
"binary_name": "zabbix-proxy-sqlite3"
},
{
"binary_version": "1:2.2.2+dfsg-1ubuntu1+esm1",
"binary_name": "zabbix-server-mysql"
},
{
"binary_version": "1:2.2.2+dfsg-1ubuntu1+esm1",
"binary_name": "zabbix-server-pgsql"
}
]
}
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "1:2.4.7+dfsg-2ubuntu2.1+esm1",
"binary_name": "zabbix-agent"
},
{
"binary_version": "1:2.4.7+dfsg-2ubuntu2.1+esm1",
"binary_name": "zabbix-frontend-php"
},
{
"binary_version": "1:2.4.7+dfsg-2ubuntu2.1+esm1",
"binary_name": "zabbix-java-gateway"
},
{
"binary_version": "1:2.4.7+dfsg-2ubuntu2.1+esm1",
"binary_name": "zabbix-proxy-mysql"
},
{
"binary_version": "1:2.4.7+dfsg-2ubuntu2.1+esm1",
"binary_name": "zabbix-proxy-pgsql"
},
{
"binary_version": "1:2.4.7+dfsg-2ubuntu2.1+esm1",
"binary_name": "zabbix-proxy-sqlite3"
},
{
"binary_version": "1:2.4.7+dfsg-2ubuntu2.1+esm1",
"binary_name": "zabbix-server-mysql"
},
{
"binary_version": "1:2.4.7+dfsg-2ubuntu2.1+esm1",
"binary_name": "zabbix-server-pgsql"
}
]
}