CVE-2009-4502

N/A Unknown
Published: December 31, 2009 Modified: April 23, 2026
View on NVD

Description

The NET_TCP_LISTEN function in net.c in Zabbix Agent before 1.6.7, when running on FreeBSD or Solaris, allows remote attackers to bypass the EnableRemoteCommands setting and execute arbitrary commands via shell metacharacters in the argument to net.tcp.listen. NOTE: this attack is limited to attacks from trusted IP addresses.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/37740
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2009/3514
Source: cve@mitre.org
Vendor Advisory
https://support.zabbix.com/browse/ZBX-1032
Source: cve@mitre.org
Exploit
http://secunia.com/advisories/37740
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/archive/1/508439
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/3514
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://support.zabbix.com/browse/ZBX-1032
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit

8 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
64.1%
98th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

sun zabbix freebsd