First published: Fri Aug 09 2024(Updated: )
Within Zabbix, users have the ability to directly modify memory pointers in the JavaScript engine.
Credit: security@zabbix.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zabbix Server | >=6.0.0<=6.0.30 | |
Zabbix Server | >=6.4.0<=6.4.15 | |
Zabbix Server | =7.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-36461 has a high severity rating due to the potential for memory manipulation leading to code execution.
To fix CVE-2024-36461, upgrade Zabbix to versions 6.0.31, 6.4.16, or 7.0.1 or later.
CVE-2024-36461 affects Zabbix versions from 6.0.0 to 6.0.30, 6.4.0 to 6.4.15, and exclusively 7.0.0.
CVE-2024-36461 can allow an attacker to manipulate memory pointers, potentially leading to a system compromise.
There are no specific workarounds documented for CVE-2024-36461; updating to a patched version is recommended.