vulnerability
FreeBSD: VID-5df8bd95-8290-11e7-93af-005056925db4 (CVE-2017-2824): Zabbix -- Remote code execution
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:M/Au:N/C:P/I:P/A:P) | Aug 16, 2017 | Aug 16, 2017 | Dec 10, 2025 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
Aug 16, 2017
Added
Aug 16, 2017
Modified
Dec 10, 2025
Description
mitre reports: An exploitable code execution vulnerability exists in the trapper command functionality of Zabbix Server 2.4.X. A specially crafted set of packets can cause a command injection resulting in remote code execution. An attacker can make requests from an active Zabbix Proxy to trigger this vulnerability.
Solutions
freebsd-upgrade-package-zabbix2-serverfreebsd-upgrade-package-zabbix2-proxyfreebsd-upgrade-package-zabbix22-serverfreebsd-upgrade-package-zabbix22-proxyfreebsd-upgrade-package-zabbix3-serverfreebsd-upgrade-package-zabbix3-proxyfreebsd-upgrade-package-zabbix32-serverfreebsd-upgrade-package-zabbix32-proxy
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.