The reported vulnerability is a stack buffer overflow in the zbx_snmp_cache_handle_engineid function within the Zabbix server/proxy code. This issue occurs when copying data from session->securityEngineID to local_record.engineid without proper bounds checking.
History

Wed, 27 Nov 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 27 Nov 2024 12:15:00 +0000

Type Values Removed Values Added
Description The reported vulnerability is a stack buffer overflow in the zbx_snmp_cache_handle_engineid function within the Zabbix server/proxy code. This issue occurs when copying data from session->securityEngineID to local_record.engineid without proper bounds checking.
Title Stack buffer overflow in zbx_snmp_cache_handle_engineid
Weaknesses CWE-121
References
Metrics cvssV3_1

{'score': 3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Zabbix

Published: 2024-11-27T12:03:07.626Z

Updated: 2024-11-27T14:57:32.411Z

Reserved: 2024-05-28T11:21:24.947Z

Link: CVE-2024-36468

cve-icon Vulnrichment

Updated: 2024-11-27T14:57:29.301Z

cve-icon NVD

Status : Received

Published: 2024-11-27T12:15:20.383

Modified: 2024-11-27T12:15:20.383

Link: CVE-2024-36468

cve-icon Redhat

No data.