First published: Wed Nov 27 2024(Updated: )
The researcher is showing that it is possible to leak a small amount of Zabbix Server memory using an out of bounds read in src/libs/zbxmedia/email.c
Credit: security@zabbix.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zabbix |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-42333 is currently classified as low, indicating a minor impact on the confidentiality of Zabbix Server memory.
To fix CVE-2024-42333, update your Zabbix Server installation to the latest available version that addresses this vulnerability.
CVE-2024-42333 allows for the potential leakage of a small amount of memory from Zabbix Server, which could expose sensitive information.
CVE-2024-42333 affects specific versions of Zabbix Server, so it is recommended to review your installed version against the vendor's advisories.
More information about CVE-2024-42333 can be found in the official Zabbix support and issue tracking database.