QID 150787

Date Published: 2024-02-08

QID 150787: Zabbix Buffer Overread Vulnerability (CVE-2023-32726)

Zabbix is an open-source software tool to monitor IT infrastructure such as networks, servers, virtual machines, and cloud services.

The vulnerability is caused by improper check for RDLENGTH, if it overflows the buffer in response from DNS server.

Affected version:
Zabbix version from 5.0.0 to 5.0.39
Zabbix version from 6.0.0 to 6.0.23
Zabbix version from 6.4.0 to 6.4.8

QID Detection Logic (Unauthenticated):
This QID sends a HTTP POST request to "api_jsonrpc.php" endpoint and checks the response body to confirm if the host is running vulnerable version of Zabbix Server.

This type of attack may result in exposure of sensitive information, a system crash, or arbitrary code execution.

  • CVSS V3 rated as Critical - 8.1 severity.
  • CVSS V2 rated as High - 7.6 severity.
  • Solution
    Customers are advised to upgrade Zabbix to new version to remediate this vulnerability. For more information please refer to ZBX-23855.

    Vendor References

    CVEs related to QID 150787

    Software Advisories
    Advisory ID Software Component Link
    ZBX-23855 URL Logo support.zabbix.com/browse/ZBX-23855