The reported vulnerability is a stack buffer overflow in the zbxsnmpcachehandleengineid function within the Zabbix server/proxy code. This issue occurs when copying data from session->securityEngineID to local_record.engineid without proper bounds checking.
[
{
"target": {
"file": "src/zabbix_java/src/com/zabbix/gateway/GeneralInformation.java"
},
"signature_version": "v1",
"digest": {
"line_hashes": [
"292971631960556532049504012454549711983",
"252186794054878738396089966044350430486",
"51727231690626324161447407021898255678",
"107830965826934551202133909220480535577",
"316143069894320711268799956090366904009",
"94555891543347806526180211855337423146"
],
"threshold": 0.9
},
"source": "https://github.com/zabbix/zabbix/commit/d93ce022627d3f10608b774e322cde3c961453e3",
"deprecated": false,
"signature_type": "Line",
"id": "CVE-2024-36468-a11457e2"
}
]