Buffer overflow in ZABBIX before 1.1.5 has unknown impact and attack vectors related to "SNMP IP addresses."
Bug #83508 reported by
StefanPotyra
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
zabbix (Debian) |
Fix Released
|
Unknown
|
|||
zabbix (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Dapper |
Invalid
|
Undecided
|
Unassigned | ||
Edgy |
Fix Released
|
Undecided
|
William Grant | ||
Feisty |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
CVE-2007-0640
affected versions: ZABBIX, 1.1.4, and previous
patch available (against latest debian package):
http://
Reference:
http://
http://
CVE References
Changed in zabbix: | |
status: | Unknown → Fix Released |
Changed in zabbix: | |
assignee: | nobody → fujitsu |
status: | Unconfirmed → In Progress |
Changed in zabbix: | |
status: | Fix Committed → Fix Released |
To post a comment you must log in.
I've just filed a sync for feisty, see bug #83507.