CVE编号
CVE-2022-23132利用情况
暂无补丁情况
N/A披露时间
2022-01-14漏洞描述
During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://lists.fedoraproject.org/archives/list/[email protected]... | |
https://lists.fedoraproject.org/archives/list/[email protected]... | |
https://support.zabbix.com/browse/ZBX-20341 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | zabbix | zabbix | * |
From (including) 4.0.0 |
Up to (including) 4.0.36 |
||||
运行在以下环境 | |||||||||
应用 | zabbix | zabbix | * |
From (including) 5.0.0 |
Up to (including) 5.0.18 |
||||
运行在以下环境 | |||||||||
应用 | zabbix | zabbix | * |
From (including) 5.4.0 |
Up to (including) 5.4.8 |
||||
运行在以下环境 | |||||||||
应用 | zabbix | zabbix | 6.0.0 | - | |||||
运行在以下环境 | |||||||||
系统 | debian_10 | zabbix | * |
Up to (excluding) 4.0.4+dfsg-1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_11 | zabbix | * |
Up to (excluding) 5.0.8+dfsg-1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_12 | zabbix | * |
Up to (excluding) 5.0.17+dfsg-1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | zabbix | * |
Up to (excluding) 3.0.7+dfsg-3 |
|||||
运行在以下环境 | |||||||||
系统 | debian_sid | zabbix | * |
Up to (excluding) 5.0.17+dfsg-1 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_34 | zabbix | * |
Up to (excluding) 5.0.19-1.fc34 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_35 | zabbix | * |
Up to (excluding) 5.0.19-1.fc35 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_EPEL_7 | zabbix | * |
Up to (excluding) 5.0.19-1.el7 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_Epel_8_Modular | zabbix | * |
Up to (excluding) 5.0-820220117005358.9edba152 |
|||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 无
- 可用性 低
- 保密性 低
- 完整性 低
还没有评论,来说两句吧...