Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2024-36349 | The reported vulnerability is a stack buffer overflow in the zbx_snmp_cache_handle_engineid function within the Zabbix server/proxy code. This issue occurs when copying data from session->securityEngineID to local_record.engineid without proper bounds checking. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Link | Providers |
---|---|
https://support.zabbix.com/browse/ZBX-25621 |
![]() ![]() |
Wed, 08 Oct 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:* |
Wed, 27 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 27 Nov 2024 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The reported vulnerability is a stack buffer overflow in the zbx_snmp_cache_handle_engineid function within the Zabbix server/proxy code. This issue occurs when copying data from session->securityEngineID to local_record.engineid without proper bounds checking. | |
Title | Stack buffer overflow in zbx_snmp_cache_handle_engineid | |
Weaknesses | CWE-121 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Zabbix
Published:
Updated: 2024-11-27T14:57:32.411Z
Reserved: 2024-05-28T11:21:24.947Z
Link: CVE-2024-36468

Updated: 2024-11-27T14:57:29.301Z

Status : Analyzed
Published: 2024-11-27T12:15:20.383
Modified: 2025-10-08T16:22:08.123
Link: CVE-2024-36468

No data.

Updated: 2025-07-12T22:31:35Z