Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2013-7484 (GCVE-0-2013-7484)
Vulnerability from cvelistv5 – Published: 2019-11-30 00:00 – Updated: 2024-08-06 18:09
VLAI?
EPSS
Summary
Zabbix before 5.0 represents passwords in the users table with unsalted MD5.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T18:09:16.946Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://support.zabbix.com/browse/ZBX-16551"
},
{
"tags": [
"x_transferred"
],
"url": "https://support.zabbix.com/browse/ZBXNEXT-1898"
},
{
"name": "[debian-lts-announce] 20230822 [SECURITY] [DLA 3538-1] zabbix security update",
"tags": [
"mailing-list",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Zabbix before 5.0 represents passwords in the users table with unsalted MD5."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T15:06:19.080Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://support.zabbix.com/browse/ZBX-16551"
},
{
"url": "https://support.zabbix.com/browse/ZBXNEXT-1898"
},
{
"name": "[debian-lts-announce] 20230822 [SECURITY] [DLA 3538-1] zabbix security update",
"tags": [
"mailing-list"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2013-7484",
"datePublished": "2019-11-30T00:00:00.000Z",
"dateReserved": "2019-11-30T00:00:00.000Z",
"dateUpdated": "2024-08-06T18:09:16.946Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2013-7484",
"date": "2026-04-21",
"epss": "0.00212",
"percentile": "0.43672"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2013-7484\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-11-30T02:15:10.390\",\"lastModified\":\"2024-11-21T02:01:07.413\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Zabbix before 5.0 represents passwords in the users table with unsalted MD5.\"},{\"lang\":\"es\",\"value\":\"Zabbix versiones anteriores a 5.0, representa contrase\u00f1as en la tabla de usuarios con MD5 sin sal.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-326\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zabbix:zabbix:2.0.8:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"956330DC-EB51-44AA-BB88-7F393D978A34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zabbix:zabbix:4.4.0:alpha2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C21DD887-14DF-4CD1-A2E9-F91910ECE94E\"}]}]}],\"references\":[{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://support.zabbix.com/browse/ZBX-16551\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.zabbix.com/browse/ZBXNEXT-1898\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.zabbix.com/browse/ZBX-16551\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.zabbix.com/browse/ZBXNEXT-1898\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
GHSA-5J69-6HHJ-5X7F
Vulnerability from github – Published: 2022-05-05 00:29 – Updated: 2023-08-22 21:30
VLAI?
Details
Zabbix before 5.0 represents passwords in the users table with unsalted MD5.
Severity ?
7.5 (High)
{
"affected": [],
"aliases": [
"CVE-2013-7484"
],
"database_specific": {
"cwe_ids": [
"CWE-326"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-11-30T02:15:00Z",
"severity": "MODERATE"
},
"details": "Zabbix before 5.0 represents passwords in the users table with unsalted MD5.",
"id": "GHSA-5j69-6hhj-5x7f",
"modified": "2023-08-22T21:30:17Z",
"published": "2022-05-05T00:29:07Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-7484"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
},
{
"type": "WEB",
"url": "https://support.zabbix.com/browse/ZBX-16551"
},
{
"type": "WEB",
"url": "https://support.zabbix.com/browse/ZBXNEXT-1898"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
BDU:2023-09070
Vulnerability from fstec - Published: 10.09.2013
VLAI Severity ?
Title
Уязвимость универсальной системы мониторинга Zabbix, связанная с слабым шифрованием, позволяющая нарушителю получить доступ к конфиденциальным данным
Description
Уязвимость универсальной системы мониторинга Zabbix связана с хешированием паролей с использованием алгоритма MD5. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, получить доступ к конфиденциальным данным
Severity ?
Vendor
ООО «РусБИТех-Астра», Сообщество свободного программного обеспечения, Zabbix LLC.
Software Name
Astra Linux Special Edition (запись в едином реестре российских программ №369), Debian GNU/Linux, Astra Linux Special Edition для «Эльбрус» (запись в едином реестре российских программ №11156), Zabbix
Software Version
1.6 «Смоленск» (Astra Linux Special Edition), 10 (Debian GNU/Linux), 8.1 «Ленинград» (Astra Linux Special Edition для «Эльбрус»), 11 (Debian GNU/Linux), 12 (Debian GNU/Linux), до 5.0.0 (Zabbix)
Possible Mitigations
Для Zabbix:
использование рекомендаций производителя: https://github.com/zabbix/zabbix/commit/0bc1a41104cf747edbda6d2c84c7ade9d714fb30
Для Debian:
использование рекомендаций производителя: https://security-tracker.debian.org/tracker/CVE-2013-7484
Для ОС Astra Linux:
обновить пакет zabbix до 1:4.0.4+dfsg-1+deb10u2+ci202309281655+astra5 или более высокой версии, используя рекомендации производителя: https://wiki.astralinux.ru/astra-linux-se16-bulletin-20231214SE16
Для ОС Astra Linux:
обновить пакет zabbix до 1:4.0.4+dfsg-1+deb10u2+ci202309281655+astra5 или более высокой версии, используя рекомендации производителя: https://wiki.astralinux.ru/astra-linux-se81-bulletin-20241206SE81
Reference
https://github.com/zabbix/zabbix/commit/0bc1a41104cf747edbda6d2c84c7ade9d714fb30
https://nvd.nist.gov/vuln/detail/CVE-2013-7484
https://security-tracker.debian.org/tracker/CVE-2013-7484
https://support.zabbix.com/browse/ZBX-16551
https://support.zabbix.com/browse/ZBXNEXT-1898
https://wiki.astralinux.ru/astra-linux-se16-bulletin-20231214SE16
https://wiki.astralinux.ru/astra-linux-se81-bulletin-20241206SE81
CWE
CWE-326
{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, Zabbix LLC.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), 10 (Debian GNU/Linux), 8.1 \u00ab\u041b\u0435\u043d\u0438\u043d\u0433\u0440\u0430\u0434\u00bb (Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb), 11 (Debian GNU/Linux), 12 (Debian GNU/Linux), \u0434\u043e 5.0.0 (Zabbix)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0414\u043b\u044f Zabbix:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://github.com/zabbix/zabbix/commit/0bc1a41104cf747edbda6d2c84c7ade9d714fb30\n\n\u0414\u043b\u044f Debian:\n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://security-tracker.debian.org/tracker/CVE-2013-7484\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 zabbix \u0434\u043e 1:4.0.4+dfsg-1+deb10u2+ci202309281655+astra5 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se16-bulletin-20231214SE16\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 zabbix \u0434\u043e 1:4.0.4+dfsg-1+deb10u2+ci202309281655+astra5 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se81-bulletin-20241206SE81",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "10.09.2013",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "29.01.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "26.12.2023",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2023-09070",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2013-7484",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Debian GNU/Linux, Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211611156), Zabbix",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb 8.1 \u00ab\u041b\u0435\u043d\u0438\u043d\u0433\u0440\u0430\u0434\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211611156), \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 12 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u043d\u0438\u0432\u0435\u0440\u0441\u0430\u043b\u044c\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433\u0430 Zabbix, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u0441\u043b\u0430\u0431\u044b\u043c \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u0435\u043c, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0421\u043b\u0430\u0431\u043e\u0435 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u0435 (CWE-326)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u043d\u0438\u0432\u0435\u0440\u0441\u0430\u043b\u044c\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433\u0430 Zabbix \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0445\u0435\u0448\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0430\u0440\u043e\u043b\u0435\u0439 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0430 MD5. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://github.com/zabbix/zabbix/commit/0bc1a41104cf747edbda6d2c84c7ade9d714fb30\nhttps://nvd.nist.gov/vuln/detail/CVE-2013-7484\nhttps://security-tracker.debian.org/tracker/CVE-2013-7484\nhttps://support.zabbix.com/browse/ZBX-16551\nhttps://support.zabbix.com/browse/ZBXNEXT-1898\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20231214SE16\nhttps://wiki.astralinux.ru/astra-linux-se81-bulletin-20241206SE81",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0437\u0430\u0449\u0438\u0442\u044b",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-326",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,8)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,5)"
}
GSD-2013-7484
Vulnerability from gsd - Updated: 2023-12-13 01:22Details
Zabbix before 5.0 represents passwords in the users table with unsalted MD5.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2013-7484",
"description": "Zabbix before 5.0 represents passwords in the users table with unsalted MD5.",
"id": "GSD-2013-7484",
"references": [
"https://www.suse.com/security/cve/CVE-2013-7484.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2013-7484"
],
"details": "Zabbix before 5.0 represents passwords in the users table with unsalted MD5.",
"id": "GSD-2013-7484",
"modified": "2023-12-13T01:22:18.403628Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-7484",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Zabbix before 5.0 represents passwords in the users table with unsalted MD5."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.zabbix.com/browse/ZBX-16551",
"refsource": "MISC",
"url": "https://support.zabbix.com/browse/ZBX-16551"
},
{
"name": "https://support.zabbix.com/browse/ZBXNEXT-1898",
"refsource": "MISC",
"url": "https://support.zabbix.com/browse/ZBXNEXT-1898"
},
{
"name": "[debian-lts-announce] 20230822 [SECURITY] [DLA 3538-1] zabbix security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:zabbix:zabbix:2.0.8:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:zabbix:zabbix:4.4.0:alpha2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2013-7484"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Zabbix before 5.0 represents passwords in the users table with unsalted MD5."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-326"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.zabbix.com/browse/ZBXNEXT-1898",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://support.zabbix.com/browse/ZBXNEXT-1898"
},
{
"name": "https://support.zabbix.com/browse/ZBX-16551",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://support.zabbix.com/browse/ZBX-16551"
},
{
"name": "[debian-lts-announce] 20230822 [SECURITY] [DLA 3538-1] zabbix security update",
"refsource": "MLIST",
"tags": [],
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-08-22T19:15Z",
"publishedDate": "2019-11-30T02:15Z"
}
}
}
SUSE-SU-2021:0990-1
Vulnerability from csaf_suse - Published: 2021-03-30 15:59 - Updated: 2021-03-30 15:59Summary
Security update for zabbix
Severity
Moderate
Notes
Title of the patch: Security update for zabbix
Description of the patch: This update for zabbix fixes the following issues:
- CVE-2021-27927: Fixed an improper CSRF protection mechanism (bsc#1183014).
- CVE-2013-7484: Fixed an issue where passwords in the users table were unsalted (bsc#1158321).
Patchnames: SUSE-2021-990,SUSE-SLE-SERVER-12-SP5-2021-990
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for zabbix",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for zabbix fixes the following issues:\n\t \n- CVE-2021-27927: Fixed an improper CSRF protection mechanism (bsc#1183014).\n- CVE-2013-7484: Fixed an issue where passwords in the users table were unsalted (bsc#1158321).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-990,SUSE-SLE-SERVER-12-SP5-2021-990",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0990-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:0990-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20210990-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:0990-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-March/008571.html"
},
{
"category": "self",
"summary": "SUSE Bug 1158321",
"url": "https://bugzilla.suse.com/1158321"
},
{
"category": "self",
"summary": "SUSE Bug 1183014",
"url": "https://bugzilla.suse.com/1183014"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2013-7484 page",
"url": "https://www.suse.com/security/cve/CVE-2013-7484/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-27927 page",
"url": "https://www.suse.com/security/cve/CVE-2021-27927/"
}
],
"title": "Security update for zabbix",
"tracking": {
"current_release_date": "2021-03-30T15:59:13Z",
"generator": {
"date": "2021-03-30T15:59:13Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:0990-1",
"initial_release_date": "2021-03-30T15:59:13Z",
"revision_history": [
{
"date": "2021-03-30T15:59:13Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "zabbix-agent-4.0.12-4.12.1.aarch64",
"product": {
"name": "zabbix-agent-4.0.12-4.12.1.aarch64",
"product_id": "zabbix-agent-4.0.12-4.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "zabbix-java-gateway-4.0.12-4.12.1.aarch64",
"product": {
"name": "zabbix-java-gateway-4.0.12-4.12.1.aarch64",
"product_id": "zabbix-java-gateway-4.0.12-4.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "zabbix-phpfrontend-4.0.12-4.12.1.aarch64",
"product": {
"name": "zabbix-phpfrontend-4.0.12-4.12.1.aarch64",
"product_id": "zabbix-phpfrontend-4.0.12-4.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "zabbix-proxy-4.0.12-4.12.1.aarch64",
"product": {
"name": "zabbix-proxy-4.0.12-4.12.1.aarch64",
"product_id": "zabbix-proxy-4.0.12-4.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "zabbix-proxy-mysql-4.0.12-4.12.1.aarch64",
"product": {
"name": "zabbix-proxy-mysql-4.0.12-4.12.1.aarch64",
"product_id": "zabbix-proxy-mysql-4.0.12-4.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "zabbix-proxy-postgresql-4.0.12-4.12.1.aarch64",
"product": {
"name": "zabbix-proxy-postgresql-4.0.12-4.12.1.aarch64",
"product_id": "zabbix-proxy-postgresql-4.0.12-4.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "zabbix-proxy-sqlite-4.0.12-4.12.1.aarch64",
"product": {
"name": "zabbix-proxy-sqlite-4.0.12-4.12.1.aarch64",
"product_id": "zabbix-proxy-sqlite-4.0.12-4.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "zabbix-server-4.0.12-4.12.1.aarch64",
"product": {
"name": "zabbix-server-4.0.12-4.12.1.aarch64",
"product_id": "zabbix-server-4.0.12-4.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "zabbix-server-mysql-4.0.12-4.12.1.aarch64",
"product": {
"name": "zabbix-server-mysql-4.0.12-4.12.1.aarch64",
"product_id": "zabbix-server-mysql-4.0.12-4.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "zabbix-server-postgresql-4.0.12-4.12.1.aarch64",
"product": {
"name": "zabbix-server-postgresql-4.0.12-4.12.1.aarch64",
"product_id": "zabbix-server-postgresql-4.0.12-4.12.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "zabbix-agent-4.0.12-4.12.1.i586",
"product": {
"name": "zabbix-agent-4.0.12-4.12.1.i586",
"product_id": "zabbix-agent-4.0.12-4.12.1.i586"
}
},
{
"category": "product_version",
"name": "zabbix-java-gateway-4.0.12-4.12.1.i586",
"product": {
"name": "zabbix-java-gateway-4.0.12-4.12.1.i586",
"product_id": "zabbix-java-gateway-4.0.12-4.12.1.i586"
}
},
{
"category": "product_version",
"name": "zabbix-phpfrontend-4.0.12-4.12.1.i586",
"product": {
"name": "zabbix-phpfrontend-4.0.12-4.12.1.i586",
"product_id": "zabbix-phpfrontend-4.0.12-4.12.1.i586"
}
},
{
"category": "product_version",
"name": "zabbix-proxy-4.0.12-4.12.1.i586",
"product": {
"name": "zabbix-proxy-4.0.12-4.12.1.i586",
"product_id": "zabbix-proxy-4.0.12-4.12.1.i586"
}
},
{
"category": "product_version",
"name": "zabbix-proxy-mysql-4.0.12-4.12.1.i586",
"product": {
"name": "zabbix-proxy-mysql-4.0.12-4.12.1.i586",
"product_id": "zabbix-proxy-mysql-4.0.12-4.12.1.i586"
}
},
{
"category": "product_version",
"name": "zabbix-proxy-postgresql-4.0.12-4.12.1.i586",
"product": {
"name": "zabbix-proxy-postgresql-4.0.12-4.12.1.i586",
"product_id": "zabbix-proxy-postgresql-4.0.12-4.12.1.i586"
}
},
{
"category": "product_version",
"name": "zabbix-proxy-sqlite-4.0.12-4.12.1.i586",
"product": {
"name": "zabbix-proxy-sqlite-4.0.12-4.12.1.i586",
"product_id": "zabbix-proxy-sqlite-4.0.12-4.12.1.i586"
}
},
{
"category": "product_version",
"name": "zabbix-server-4.0.12-4.12.1.i586",
"product": {
"name": "zabbix-server-4.0.12-4.12.1.i586",
"product_id": "zabbix-server-4.0.12-4.12.1.i586"
}
},
{
"category": "product_version",
"name": "zabbix-server-mysql-4.0.12-4.12.1.i586",
"product": {
"name": "zabbix-server-mysql-4.0.12-4.12.1.i586",
"product_id": "zabbix-server-mysql-4.0.12-4.12.1.i586"
}
},
{
"category": "product_version",
"name": "zabbix-server-postgresql-4.0.12-4.12.1.i586",
"product": {
"name": "zabbix-server-postgresql-4.0.12-4.12.1.i586",
"product_id": "zabbix-server-postgresql-4.0.12-4.12.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "zabbix-agent-4.0.12-4.12.1.ppc64le",
"product": {
"name": "zabbix-agent-4.0.12-4.12.1.ppc64le",
"product_id": "zabbix-agent-4.0.12-4.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "zabbix-java-gateway-4.0.12-4.12.1.ppc64le",
"product": {
"name": "zabbix-java-gateway-4.0.12-4.12.1.ppc64le",
"product_id": "zabbix-java-gateway-4.0.12-4.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "zabbix-phpfrontend-4.0.12-4.12.1.ppc64le",
"product": {
"name": "zabbix-phpfrontend-4.0.12-4.12.1.ppc64le",
"product_id": "zabbix-phpfrontend-4.0.12-4.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "zabbix-proxy-4.0.12-4.12.1.ppc64le",
"product": {
"name": "zabbix-proxy-4.0.12-4.12.1.ppc64le",
"product_id": "zabbix-proxy-4.0.12-4.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "zabbix-proxy-mysql-4.0.12-4.12.1.ppc64le",
"product": {
"name": "zabbix-proxy-mysql-4.0.12-4.12.1.ppc64le",
"product_id": "zabbix-proxy-mysql-4.0.12-4.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "zabbix-proxy-postgresql-4.0.12-4.12.1.ppc64le",
"product": {
"name": "zabbix-proxy-postgresql-4.0.12-4.12.1.ppc64le",
"product_id": "zabbix-proxy-postgresql-4.0.12-4.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "zabbix-proxy-sqlite-4.0.12-4.12.1.ppc64le",
"product": {
"name": "zabbix-proxy-sqlite-4.0.12-4.12.1.ppc64le",
"product_id": "zabbix-proxy-sqlite-4.0.12-4.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "zabbix-server-4.0.12-4.12.1.ppc64le",
"product": {
"name": "zabbix-server-4.0.12-4.12.1.ppc64le",
"product_id": "zabbix-server-4.0.12-4.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "zabbix-server-mysql-4.0.12-4.12.1.ppc64le",
"product": {
"name": "zabbix-server-mysql-4.0.12-4.12.1.ppc64le",
"product_id": "zabbix-server-mysql-4.0.12-4.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "zabbix-server-postgresql-4.0.12-4.12.1.ppc64le",
"product": {
"name": "zabbix-server-postgresql-4.0.12-4.12.1.ppc64le",
"product_id": "zabbix-server-postgresql-4.0.12-4.12.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "zabbix-agent-4.0.12-4.12.1.s390",
"product": {
"name": "zabbix-agent-4.0.12-4.12.1.s390",
"product_id": "zabbix-agent-4.0.12-4.12.1.s390"
}
},
{
"category": "product_version",
"name": "zabbix-java-gateway-4.0.12-4.12.1.s390",
"product": {
"name": "zabbix-java-gateway-4.0.12-4.12.1.s390",
"product_id": "zabbix-java-gateway-4.0.12-4.12.1.s390"
}
},
{
"category": "product_version",
"name": "zabbix-phpfrontend-4.0.12-4.12.1.s390",
"product": {
"name": "zabbix-phpfrontend-4.0.12-4.12.1.s390",
"product_id": "zabbix-phpfrontend-4.0.12-4.12.1.s390"
}
},
{
"category": "product_version",
"name": "zabbix-proxy-4.0.12-4.12.1.s390",
"product": {
"name": "zabbix-proxy-4.0.12-4.12.1.s390",
"product_id": "zabbix-proxy-4.0.12-4.12.1.s390"
}
},
{
"category": "product_version",
"name": "zabbix-proxy-mysql-4.0.12-4.12.1.s390",
"product": {
"name": "zabbix-proxy-mysql-4.0.12-4.12.1.s390",
"product_id": "zabbix-proxy-mysql-4.0.12-4.12.1.s390"
}
},
{
"category": "product_version",
"name": "zabbix-proxy-postgresql-4.0.12-4.12.1.s390",
"product": {
"name": "zabbix-proxy-postgresql-4.0.12-4.12.1.s390",
"product_id": "zabbix-proxy-postgresql-4.0.12-4.12.1.s390"
}
},
{
"category": "product_version",
"name": "zabbix-proxy-sqlite-4.0.12-4.12.1.s390",
"product": {
"name": "zabbix-proxy-sqlite-4.0.12-4.12.1.s390",
"product_id": "zabbix-proxy-sqlite-4.0.12-4.12.1.s390"
}
},
{
"category": "product_version",
"name": "zabbix-server-4.0.12-4.12.1.s390",
"product": {
"name": "zabbix-server-4.0.12-4.12.1.s390",
"product_id": "zabbix-server-4.0.12-4.12.1.s390"
}
},
{
"category": "product_version",
"name": "zabbix-server-mysql-4.0.12-4.12.1.s390",
"product": {
"name": "zabbix-server-mysql-4.0.12-4.12.1.s390",
"product_id": "zabbix-server-mysql-4.0.12-4.12.1.s390"
}
},
{
"category": "product_version",
"name": "zabbix-server-postgresql-4.0.12-4.12.1.s390",
"product": {
"name": "zabbix-server-postgresql-4.0.12-4.12.1.s390",
"product_id": "zabbix-server-postgresql-4.0.12-4.12.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "zabbix-agent-4.0.12-4.12.1.s390x",
"product": {
"name": "zabbix-agent-4.0.12-4.12.1.s390x",
"product_id": "zabbix-agent-4.0.12-4.12.1.s390x"
}
},
{
"category": "product_version",
"name": "zabbix-java-gateway-4.0.12-4.12.1.s390x",
"product": {
"name": "zabbix-java-gateway-4.0.12-4.12.1.s390x",
"product_id": "zabbix-java-gateway-4.0.12-4.12.1.s390x"
}
},
{
"category": "product_version",
"name": "zabbix-phpfrontend-4.0.12-4.12.1.s390x",
"product": {
"name": "zabbix-phpfrontend-4.0.12-4.12.1.s390x",
"product_id": "zabbix-phpfrontend-4.0.12-4.12.1.s390x"
}
},
{
"category": "product_version",
"name": "zabbix-proxy-4.0.12-4.12.1.s390x",
"product": {
"name": "zabbix-proxy-4.0.12-4.12.1.s390x",
"product_id": "zabbix-proxy-4.0.12-4.12.1.s390x"
}
},
{
"category": "product_version",
"name": "zabbix-proxy-mysql-4.0.12-4.12.1.s390x",
"product": {
"name": "zabbix-proxy-mysql-4.0.12-4.12.1.s390x",
"product_id": "zabbix-proxy-mysql-4.0.12-4.12.1.s390x"
}
},
{
"category": "product_version",
"name": "zabbix-proxy-postgresql-4.0.12-4.12.1.s390x",
"product": {
"name": "zabbix-proxy-postgresql-4.0.12-4.12.1.s390x",
"product_id": "zabbix-proxy-postgresql-4.0.12-4.12.1.s390x"
}
},
{
"category": "product_version",
"name": "zabbix-proxy-sqlite-4.0.12-4.12.1.s390x",
"product": {
"name": "zabbix-proxy-sqlite-4.0.12-4.12.1.s390x",
"product_id": "zabbix-proxy-sqlite-4.0.12-4.12.1.s390x"
}
},
{
"category": "product_version",
"name": "zabbix-server-4.0.12-4.12.1.s390x",
"product": {
"name": "zabbix-server-4.0.12-4.12.1.s390x",
"product_id": "zabbix-server-4.0.12-4.12.1.s390x"
}
},
{
"category": "product_version",
"name": "zabbix-server-mysql-4.0.12-4.12.1.s390x",
"product": {
"name": "zabbix-server-mysql-4.0.12-4.12.1.s390x",
"product_id": "zabbix-server-mysql-4.0.12-4.12.1.s390x"
}
},
{
"category": "product_version",
"name": "zabbix-server-postgresql-4.0.12-4.12.1.s390x",
"product": {
"name": "zabbix-server-postgresql-4.0.12-4.12.1.s390x",
"product_id": "zabbix-server-postgresql-4.0.12-4.12.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "zabbix-agent-4.0.12-4.12.1.x86_64",
"product": {
"name": "zabbix-agent-4.0.12-4.12.1.x86_64",
"product_id": "zabbix-agent-4.0.12-4.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "zabbix-java-gateway-4.0.12-4.12.1.x86_64",
"product": {
"name": "zabbix-java-gateway-4.0.12-4.12.1.x86_64",
"product_id": "zabbix-java-gateway-4.0.12-4.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "zabbix-phpfrontend-4.0.12-4.12.1.x86_64",
"product": {
"name": "zabbix-phpfrontend-4.0.12-4.12.1.x86_64",
"product_id": "zabbix-phpfrontend-4.0.12-4.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "zabbix-proxy-4.0.12-4.12.1.x86_64",
"product": {
"name": "zabbix-proxy-4.0.12-4.12.1.x86_64",
"product_id": "zabbix-proxy-4.0.12-4.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "zabbix-proxy-mysql-4.0.12-4.12.1.x86_64",
"product": {
"name": "zabbix-proxy-mysql-4.0.12-4.12.1.x86_64",
"product_id": "zabbix-proxy-mysql-4.0.12-4.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "zabbix-proxy-postgresql-4.0.12-4.12.1.x86_64",
"product": {
"name": "zabbix-proxy-postgresql-4.0.12-4.12.1.x86_64",
"product_id": "zabbix-proxy-postgresql-4.0.12-4.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "zabbix-proxy-sqlite-4.0.12-4.12.1.x86_64",
"product": {
"name": "zabbix-proxy-sqlite-4.0.12-4.12.1.x86_64",
"product_id": "zabbix-proxy-sqlite-4.0.12-4.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "zabbix-server-4.0.12-4.12.1.x86_64",
"product": {
"name": "zabbix-server-4.0.12-4.12.1.x86_64",
"product_id": "zabbix-server-4.0.12-4.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "zabbix-server-mysql-4.0.12-4.12.1.x86_64",
"product": {
"name": "zabbix-server-mysql-4.0.12-4.12.1.x86_64",
"product_id": "zabbix-server-mysql-4.0.12-4.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "zabbix-server-postgresql-4.0.12-4.12.1.x86_64",
"product": {
"name": "zabbix-server-postgresql-4.0.12-4.12.1.x86_64",
"product_id": "zabbix-server-postgresql-4.0.12-4.12.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "zabbix-agent-4.0.12-4.12.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:zabbix-agent-4.0.12-4.12.1.aarch64"
},
"product_reference": "zabbix-agent-4.0.12-4.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zabbix-agent-4.0.12-4.12.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:zabbix-agent-4.0.12-4.12.1.ppc64le"
},
"product_reference": "zabbix-agent-4.0.12-4.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zabbix-agent-4.0.12-4.12.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:zabbix-agent-4.0.12-4.12.1.s390x"
},
"product_reference": "zabbix-agent-4.0.12-4.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zabbix-agent-4.0.12-4.12.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:zabbix-agent-4.0.12-4.12.1.x86_64"
},
"product_reference": "zabbix-agent-4.0.12-4.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zabbix-agent-4.0.12-4.12.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:zabbix-agent-4.0.12-4.12.1.aarch64"
},
"product_reference": "zabbix-agent-4.0.12-4.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zabbix-agent-4.0.12-4.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:zabbix-agent-4.0.12-4.12.1.ppc64le"
},
"product_reference": "zabbix-agent-4.0.12-4.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zabbix-agent-4.0.12-4.12.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:zabbix-agent-4.0.12-4.12.1.s390x"
},
"product_reference": "zabbix-agent-4.0.12-4.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "zabbix-agent-4.0.12-4.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:zabbix-agent-4.0.12-4.12.1.x86_64"
},
"product_reference": "zabbix-agent-4.0.12-4.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2013-7484",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2013-7484"
}
],
"notes": [
{
"category": "general",
"text": "Zabbix before 5.0 represents passwords in the users table with unsalted MD5.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:zabbix-agent-4.0.12-4.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:zabbix-agent-4.0.12-4.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:zabbix-agent-4.0.12-4.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:zabbix-agent-4.0.12-4.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:zabbix-agent-4.0.12-4.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:zabbix-agent-4.0.12-4.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:zabbix-agent-4.0.12-4.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:zabbix-agent-4.0.12-4.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2013-7484",
"url": "https://www.suse.com/security/cve/CVE-2013-7484"
},
{
"category": "external",
"summary": "SUSE Bug 1158321 for CVE-2013-7484",
"url": "https://bugzilla.suse.com/1158321"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:zabbix-agent-4.0.12-4.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:zabbix-agent-4.0.12-4.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:zabbix-agent-4.0.12-4.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:zabbix-agent-4.0.12-4.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:zabbix-agent-4.0.12-4.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:zabbix-agent-4.0.12-4.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:zabbix-agent-4.0.12-4.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:zabbix-agent-4.0.12-4.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:zabbix-agent-4.0.12-4.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:zabbix-agent-4.0.12-4.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:zabbix-agent-4.0.12-4.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:zabbix-agent-4.0.12-4.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:zabbix-agent-4.0.12-4.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:zabbix-agent-4.0.12-4.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:zabbix-agent-4.0.12-4.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:zabbix-agent-4.0.12-4.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-03-30T15:59:13Z",
"details": "moderate"
}
],
"title": "CVE-2013-7484"
},
{
"cve": "CVE-2021-27927",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-27927"
}
],
"notes": [
{
"category": "general",
"text": "In Zabbix from 4.0.x before 4.0.28rc1, 5.0.0alpha1 before 5.0.10rc1, 5.2.x before 5.2.6rc1, and 5.4.0alpha1 before 5.4.0beta2, the CControllerAuthenticationUpdate controller lacks a CSRF protection mechanism. The code inside this controller calls diableSIDValidation inside the init() method. An attacker doesn\u0027t have to know Zabbix user login credentials, but has to know the correct Zabbix URL and contact information of an existing user with sufficient privileges.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:zabbix-agent-4.0.12-4.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:zabbix-agent-4.0.12-4.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:zabbix-agent-4.0.12-4.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:zabbix-agent-4.0.12-4.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:zabbix-agent-4.0.12-4.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:zabbix-agent-4.0.12-4.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:zabbix-agent-4.0.12-4.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:zabbix-agent-4.0.12-4.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-27927",
"url": "https://www.suse.com/security/cve/CVE-2021-27927"
},
{
"category": "external",
"summary": "SUSE Bug 1183014 for CVE-2021-27927",
"url": "https://bugzilla.suse.com/1183014"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:zabbix-agent-4.0.12-4.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:zabbix-agent-4.0.12-4.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:zabbix-agent-4.0.12-4.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:zabbix-agent-4.0.12-4.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:zabbix-agent-4.0.12-4.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:zabbix-agent-4.0.12-4.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:zabbix-agent-4.0.12-4.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:zabbix-agent-4.0.12-4.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:zabbix-agent-4.0.12-4.12.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:zabbix-agent-4.0.12-4.12.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:zabbix-agent-4.0.12-4.12.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:zabbix-agent-4.0.12-4.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:zabbix-agent-4.0.12-4.12.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:zabbix-agent-4.0.12-4.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:zabbix-agent-4.0.12-4.12.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:zabbix-agent-4.0.12-4.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-03-30T15:59:13Z",
"details": "important"
}
],
"title": "CVE-2021-27927"
}
]
}
FKIE_CVE-2013-7484
Vulnerability from fkie_nvd - Published: 2019-11-30 02:15 - Updated: 2024-11-21 02:01
Severity ?
Summary
Zabbix before 5.0 represents passwords in the users table with unsalted MD5.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html | ||
| cve@mitre.org | https://support.zabbix.com/browse/ZBX-16551 | Vendor Advisory | |
| cve@mitre.org | https://support.zabbix.com/browse/ZBXNEXT-1898 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://support.zabbix.com/browse/ZBX-16551 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.zabbix.com/browse/ZBXNEXT-1898 | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zabbix:zabbix:2.0.8:-:*:*:*:*:*:*",
"matchCriteriaId": "956330DC-EB51-44AA-BB88-7F393D978A34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:zabbix:zabbix:4.4.0:alpha2:*:*:*:*:*:*",
"matchCriteriaId": "C21DD887-14DF-4CD1-A2E9-F91910ECE94E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Zabbix before 5.0 represents passwords in the users table with unsalted MD5."
},
{
"lang": "es",
"value": "Zabbix versiones anteriores a 5.0, representa contrase\u00f1as en la tabla de usuarios con MD5 sin sal."
}
],
"id": "CVE-2013-7484",
"lastModified": "2024-11-21T02:01:07.413",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-11-30T02:15:10.390",
"references": [
{
"source": "cve@mitre.org",
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://support.zabbix.com/browse/ZBX-16551"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://support.zabbix.com/browse/ZBXNEXT-1898"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://support.zabbix.com/browse/ZBX-16551"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://support.zabbix.com/browse/ZBXNEXT-1898"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-326"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CNVD-2020-46832
Vulnerability from cnvd - Published: 2020-08-19
VLAI Severity ?
Title
Zabbix SIA Zabbix加密问题漏洞
Description
Zabbix SIA Zabbix是拉脱维亚Zabbix SIA公司的一套开源的监控系统。该系统支持网络监控、服务器监控、云监控和应用监控等。
Zabbix SIA Zabbix 5.0之前版本中存在加密问题漏洞,该漏洞源于程序使用MD5算法对用户密码进行哈希运算。目前没有详细漏洞细节提供。
Severity
中
Patch Name
Zabbix SIA Zabbix加密问题漏洞的补丁
Patch Description
Zabbix SIA Zabbix是拉脱维亚Zabbix SIA公司的一套开源的监控系统。该系统支持网络监控、服务器监控、云监控和应用监控等。
Zabbix SIA Zabbix 5.0之前版本中存在加密问题漏洞,该漏洞源于程序使用MD5算法对用户密码进行哈希运算。目前没有详细漏洞细节提供。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布了漏洞修复程序,请及时关注更新: https://support.zabbix.com/browse/ZBXNEXT-1898
Reference
https://nvd.nist.gov/vuln/detail/CVE-2013-7484
Impacted products
| Name | Zabbix SIA Zabbix SIA Zabbix <5.0 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2013-7484",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2013-7484"
}
},
"description": "Zabbix SIA Zabbix\u662f\u62c9\u8131\u7ef4\u4e9aZabbix SIA\u516c\u53f8\u7684\u4e00\u5957\u5f00\u6e90\u7684\u76d1\u63a7\u7cfb\u7edf\u3002\u8be5\u7cfb\u7edf\u652f\u6301\u7f51\u7edc\u76d1\u63a7\u3001\u670d\u52a1\u5668\u76d1\u63a7\u3001\u4e91\u76d1\u63a7\u548c\u5e94\u7528\u76d1\u63a7\u7b49\u3002\n\nZabbix SIA Zabbix 5.0\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u52a0\u5bc6\u95ee\u9898\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u4f7f\u7528MD5\u7b97\u6cd5\u5bf9\u7528\u6237\u5bc6\u7801\u8fdb\u884c\u54c8\u5e0c\u8fd0\u7b97\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://support.zabbix.com/browse/ZBXNEXT-1898",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2020-46832",
"openTime": "2020-08-19",
"patchDescription": "Zabbix SIA Zabbix\u662f\u62c9\u8131\u7ef4\u4e9aZabbix SIA\u516c\u53f8\u7684\u4e00\u5957\u5f00\u6e90\u7684\u76d1\u63a7\u7cfb\u7edf\u3002\u8be5\u7cfb\u7edf\u652f\u6301\u7f51\u7edc\u76d1\u63a7\u3001\u670d\u52a1\u5668\u76d1\u63a7\u3001\u4e91\u76d1\u63a7\u548c\u5e94\u7528\u76d1\u63a7\u7b49\u3002\r\n\r\nZabbix SIA Zabbix 5.0\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u52a0\u5bc6\u95ee\u9898\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u7a0b\u5e8f\u4f7f\u7528MD5\u7b97\u6cd5\u5bf9\u7528\u6237\u5bc6\u7801\u8fdb\u884c\u54c8\u5e0c\u8fd0\u7b97\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Zabbix SIA Zabbix\u52a0\u5bc6\u95ee\u9898\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Zabbix SIA Zabbix SIA Zabbix \u003c5.0"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2013-7484",
"serverity": "\u4e2d",
"submitTime": "2019-12-05",
"title": "Zabbix SIA Zabbix\u52a0\u5bc6\u95ee\u9898\u6f0f\u6d1e"
}
Loading…
Show additional events:
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…