The reported vulnerability is a stack buffer overflow in the zbx_snmp_cache_handle_engineid function within the Zabbix server/proxy code. This issue occurs when copying data from session->securityEngineID to local_record.engineid without proper bounds checking.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://support.zabbix.com/browse/ZBX-25621 |
|
History
Wed, 08 Oct 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:* |
Wed, 27 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 27 Nov 2024 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The reported vulnerability is a stack buffer overflow in the zbx_snmp_cache_handle_engineid function within the Zabbix server/proxy code. This issue occurs when copying data from session->securityEngineID to local_record.engineid without proper bounds checking. | |
| Title | Stack buffer overflow in zbx_snmp_cache_handle_engineid | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Zabbix
Published: 2024-11-27T12:03:07.626Z
Updated: 2024-11-27T14:57:32.411Z
Reserved: 2024-05-28T11:21:24.947Z
Link: CVE-2024-36468
Updated: 2024-11-27T14:57:29.301Z
Status : Analyzed
Published: 2024-11-27T12:15:20.383
Modified: 2025-10-08T16:22:08.123
Link: CVE-2024-36468
No data.