ALT-BU-2016-2779-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-4338
The mysql user parameter configuration script (userparameter_mysql.conf) in the agent in Zabbix before 2.0.18, 2.2.x before 2.2.13, and 3.0.x before 3.0.3, when used with a shell other than bash, allows context-dependent attackers to execute arbitrary code or SQL commands via the mysql.size parameter.
- http://packetstormsecurity.com/files/136898/Zabbix-Agent-3.0.1-mysql.size-Shell-Command-Injection.html
- http://packetstormsecurity.com/files/136898/Zabbix-Agent-3.0.1-mysql.size-Shell-Command-Injection.html
- 20160503 CVE-2016-4338: Zabbix Agent 3.0.1 mysql.size shell command injection
- 20160503 CVE-2016-4338: Zabbix Agent 3.0.1 mysql.size shell command injection
- 20160503 CVE-2016-4338: Zabbix Agent 3.0.1 mysql.size shell command injection
- 20160503 CVE-2016-4338: Zabbix Agent 3.0.1 mysql.size shell command injection
- 89631
- 89631
- GLSA-201612-42
- GLSA-201612-42
- https://support.zabbix.com/browse/ZBX-10741
- https://support.zabbix.com/browse/ZBX-10741
- 39769
- 39769
- https://www.zabbix.com/documentation/2.0/manual/introduction/whatsnew2018#miscellaneous_improvements
- https://www.zabbix.com/documentation/2.0/manual/introduction/whatsnew2018#miscellaneous_improvements
- https://www.zabbix.com/documentation/2.2/manual/introduction/whatsnew2213#miscellaneous_improvements
- https://www.zabbix.com/documentation/2.2/manual/introduction/whatsnew2213#miscellaneous_improvements
- https://www.zabbix.com/documentation/3.0/manual/introduction/whatsnew303#miscellaneous_improvements
- https://www.zabbix.com/documentation/3.0/manual/introduction/whatsnew303#miscellaneous_improvements
Closed vulnerabilities
BDU:2019-02883
Уязвимость функции do_doctor DNS-сервера dnsmasq, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2024-11-21
CVE-2015-8899
Dnsmasq before 2.76 allows remote servers to cause a denial of service (crash) via a reply with an empty DNS address that has an (1) A or (2) AAAA record defined locally.
- [Dnsmasq-discuss] 20160418 Dnsmasq 2.75 on Ubuntu 16.04 crashes reproducibly
- [Dnsmasq-discuss] 20160418 Dnsmasq 2.75 on Ubuntu 16.04 crashes reproducibly
- [Dnsmasq-discuss] 20160503 Dnsmasq 2.75 on Ubuntu 16.04 crashes reproducibly
- [Dnsmasq-discuss] 20160503 Dnsmasq 2.75 on Ubuntu 16.04 crashes reproducibly
- http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=41a8d9e99be9f2cc8b02051dd322cb45e0faac87
- http://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=41a8d9e99be9f2cc8b02051dd322cb45e0faac87
- [oss-security] 20160603 CVE Request: Dnsmasq denial of service
- [oss-security] 20160603 CVE Request: Dnsmasq denial of service
- [oss-security] 20160603 Re: CVE Request: Dnsmasq denial of service
- [oss-security] 20160603 Re: CVE Request: Dnsmasq denial of service
- 91031
- 91031
- 1036045
- 1036045
- USN-3009-1
- USN-3009-1
Modified: 2024-11-21
CVE-2019-14513
Improper bounds checking in Dnsmasq before 2.76 allows an attacker controlled DNS server to send large DNS packets that result in a read operation beyond the buffer allocated for the packet, a different vulnerability than CVE-2017-14491.