Zabbix security update for Debian 11 LTS

Published by

Zabbix Security Update for Debian 11 LTS

A significant security update has been released for Zabbix, a network monitoring solution, specifically for Debian GNU/Linux 11 (Bullseye) LTS. This update addresses multiple security vulnerabilities that could lead to denial of service, information disclosure, and remote code execution. The vulnerabilities include issues related to execution time discrepancies for failed login attempts, cross-site scripting (XSS) vulnerabilities, and a denial-of-service (DoS) vulnerability caused by resource exhaustion.

Details of the Vulnerabilities:

1. CVE-2024-36469: The execution time for failed login attempts varies between a non-existing username and an existing one, which could be exploited for timing attacks.

2. CVE-2024-42325: The Zabbix API's `user.get` function returns all users that belong to the same group as the requesting user, thereby exposing sensitive information, including login attempts and media data.

3. CVE-2024-45699: The `/zabbix.php?action=export.valuemaps` endpoint is susceptible to XSS attacks through the `backurl` parameter, allowing the injection of malicious JavaScript that could execute in the victim's browser.

4. CVE-2024-45700: The Zabbix server can be compromised through a DoS attack by sending specially crafted requests, which lead to excessive memory allocation and CPU usage, ultimately crashing the service.

Update Information:
The vulnerabilities have been patched in version 1:5.0.46+dfsg-1+deb11u1. Users are strongly encouraged to upgrade their Zabbix packages to ensure their systems are secure.

For more information regarding the security status of Zabbix, visit the [Debian Security Tracker](https://security-tracker.debian.org/tracker/zabbix). Additional resources about Debian LTS security advisories, update application procedures, and FAQs can be found on the [Debian Wiki](https://wiki.debian.org/LTS).

Extension:
This update highlights the importance of maintaining cybersecurity hygiene in software systems, especially those used for network monitoring and management. Organizations should regularly audit their systems for vulnerabilities and apply patches promptly. Additionally, implementing robust security practices such as the principle of least privilege, input validation, and regular security training for developers can help mitigate the risk of such vulnerabilities in the future. As cyber threats evolve, continuous monitoring and proactive measures are essential to safeguard sensitive information and maintain the integrity of IT infrastructures

Zabbix security update for Debian 11 LTS

New Zabbix packages have been released for Debian GNU/Linux 11 (Bullseye) LTS to address multiple security vulnerabilities that may enable denial of service, information disclosure, or remote code inclusion. These encompass variations in execution time for failed login attempts, vulnerabilities related to cross-site scripting, and a denial-of-service vulnerability stemming from resource exhaustion.

[DLA 4131-1] zabbix security update

Zabbix security update for Debian 11 LTS @ Linux Compatible