The reported vulnerability is a stack buffer overflow in the zbx_snmp_cache_handle_engineid function within the Zabbix server/proxy code. This issue occurs when copying data from session->securityEngineID to local_record.engineid without proper bounds checking.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://support.zabbix.com/browse/ZBX-25621 |
![]() ![]() |
History
Wed, 27 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 27 Nov 2024 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The reported vulnerability is a stack buffer overflow in the zbx_snmp_cache_handle_engineid function within the Zabbix server/proxy code. This issue occurs when copying data from session->securityEngineID to local_record.engineid without proper bounds checking. | |
Title | Stack buffer overflow in zbx_snmp_cache_handle_engineid | |
Weaknesses | CWE-121 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Zabbix
Published: 2024-11-27T12:03:07.626Z
Updated: 2024-11-27T14:57:32.411Z
Reserved: 2024-05-28T11:21:24.947Z
Link: CVE-2024-36468

Updated: 2024-11-27T14:57:29.301Z

Status : Received
Published: 2024-11-27T12:15:20.383
Modified: 2024-11-27T12:15:20.383
Link: CVE-2024-36468

No data.