CVE-2017-2825

Source
https://cve.org/CVERecord?id=CVE-2017-2825
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-2825.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2017-2825
Downstream
Published
2018-04-20T21:29:00.563Z
Modified
2026-02-15T07:13:05.786721Z
Severity
  • 7.0 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L CVSS Calculator
Summary
[none]
Details

In the trapper functionality of Zabbix Server 2.4.x, specifically crafted trapper packets can pass database logic checks, resulting in database writes. An attacker can set up a Man-in-the-Middle server to alter trapper requests made between an active Zabbix proxy and Server to trigger this vulnerability.

References

Affected packages

Git / git.savannah.gnu.org/git/freetype/freetype2.git/

Affected ranges

Type
GIT
Repo
http://git.savannah.gnu.org/git/freetype/freetype2.git/
Events
Introduced
15ffc3546df4cb368f585c018da08b448500ce47
Last affected
9d7f0957fbd10fdbabf9815e37857a910ad4f4ac

Affected versions

Other
VER-2-4-0
VER-2-4-1
VER-2-4-2
VER-2-4-3
VER-2-4-4
VER-2-4-5
VER-2-4-6
VER-2-4-7
VER-2-4-8

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-2825.json"