Bugzilla – Bug 1218199
VUL-0: CVE-2023-32727: zabbix: potential arbitrary code execution in icmpping() function
Last modified: 2024-05-29 11:16:02 UTC
An attacker who has the privilege to configure Zabbix items can use function icmpping() with additional malicious command inside it to execute arbitrary code on the current Zabbix server. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-32727 https://support.zabbix.com/browse/ZBX-23857 Patch: https://github.com/zabbix/zabbix/commit/0bdbce011b2ab5b533491d766f164c81d021b258 https://github.com/zabbix/zabbix/commit/969ac7663f287ec6ce5c7f8cc6d5e2bba3969334
update in pipeline
This is an autogenerated message for OBS integration: This bug (1218199) was mentioned in https://build.opensuse.org/request/show/1134975 Backports:SLE-15-SP5 / zabbix https://build.opensuse.org/request/show/1134977 Backports:SLE-15-SP4 / zabbix https://build.opensuse.org/request/show/1134978 Backports:SLE-15-SP5 / zabbix
openSUSE-SU-2023:0419-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1218199 CVE References: CVE-2023-32727 JIRA References: Sources used: openSUSE Backports SLE-15-SP4 (src): zabbix-4.0.50-bp154.2.9.1
openSUSE-SU-2023:0418-1: An update that fixes one vulnerability is now available. Category: security (important) Bug References: 1218199 CVE References: CVE-2023-32727 JIRA References: Sources used: openSUSE Backports SLE-15-SP5 (src): zabbix-4.0.50-bp155.3.9.1
Missing in Leap 15.6. Please process incoming submission or fix in Leap 15.6 in your chosen way. (bug 1225537)
As per bug 1225537 now also fixed in Leap 15.6, closing