Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sat, 28 Jul 2012 00:44:04 -0600
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Vincent Danen <vdanen@...hat.com>
Subject: Re: Zabbix SQL injection flaw (CVE request)

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 07/27/2012 05:05 PM, Vincent Danen wrote:
> Could a CVE be assigned to this please?
> 
> An SQL injection flaw was found in Zabbix, where input passed via
> the "itemid" parameter to popup_bitem.php is not properly sanitized
> before being used in an SQL query.
> 
> The report was against version 2.0.1, but the upstream bug report
> [1] indicates this also affects 1.8.x.  Upstream has patched [2]
> this, and there is a potential patch for 1.8.x [3].
> 
> [1] https://support.zabbix.com/browse/ZBX-5348 [2] 
> http://git.zabbixzone.com/zabbix2.0/.git/commit/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54
>
>  [3] https://gist.github.com/3181678
> 
> Other references:
> 
> https://bugzilla.redhat.com/show_bug.cgi?id=843927 
> https://bugs.gentoo.org/show_bug.cgi?id=428372
> 
> Thanks.

Please use CVE-2012-3435 for this issue.


- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQIcBAEBAgAGBQJQE4o0AAoJEBYNRVNeJnmTluYQANTczLP8n/QyflI7B8d1OdHH
xIU5vjTAAXKEb0G24AkqD1TbGHFg765bTQH55F75ZGkMbw28JedaOG0iwhlFbJ4o
HzSLaDV0kVsWyQnZFVnbhEkaxtctQtvPONOOlE6+fy5xyXl5bhY5AD/rXCO6+5f1
c9bxlfl2jjlHMhopEGZ7qfcsWxHc2yIVm+THKSWr8QHwmscC1XPrlwYlaGLn4Vpw
9BoILPKK6VwFjKeNze20kQ6pz8FKZlW+J2lTxFWQMBlNuO73nVwjCohMVF6SYguo
NbNO/0TToMx/ZLlkbblcOnDwzoy3dQo+H93Wo2T/bOwI2dpSr1/Lb1el3GgiZ/e6
ltG/G41FRd79qRpgfgJ9rrTtRc3JYPXGu+exvrHY5fjjhJDduBmLEecshecKVa8y
guazlrVAGiYgId6HQ9NVtodwCbzOdQ4awuU22RadeAmxlDgYjz4V6dGRUyhY1LH1
xSXcTIjFfPsh0ony5ZiTPFmyV1uU3tS/diZ+Xla/zPIQ0esIkeW1n/6m+0Y5e1WU
TKzkCXULAm3A6PKwRnIfn+d0L1Tedtkld1V2WENxxD38+61yfyzXQakNtpD/3d3c
FwpnXXg83l/HGpTnB+yRoxbNcSUuwBYmYxe/BSBd0IRhQUlqsZFnnZPcBV5bGR9Z
bnK1p3rRzTZdYbDvhzEQ
=Ln7u
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ