Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-36349 | The reported vulnerability is a stack buffer overflow in the zbx_snmp_cache_handle_engineid function within the Zabbix server/proxy code. This issue occurs when copying data from session->securityEngineID to local_record.engineid without proper bounds checking. |
| Link | Providers |
|---|---|
| https://support.zabbix.com/browse/ZBX-25621 |
|
Wed, 08 Oct 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:* |
Wed, 27 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 27 Nov 2024 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The reported vulnerability is a stack buffer overflow in the zbx_snmp_cache_handle_engineid function within the Zabbix server/proxy code. This issue occurs when copying data from session->securityEngineID to local_record.engineid without proper bounds checking. | |
| Title | Stack buffer overflow in zbx_snmp_cache_handle_engineid | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Zabbix
Published:
Updated: 2024-11-27T14:57:32.411Z
Reserved: 2024-05-28T11:21:24.947Z
Link: CVE-2024-36468
Updated: 2024-11-27T14:57:29.301Z
Status : Analyzed
Published: 2024-11-27T12:15:20.383
Modified: 2025-10-08T16:22:08.123
Link: CVE-2024-36468
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:31:35Z
EUVD