The researcher is showing that it is possible to leak a small amount of Zabbix Server memory using an out of bounds read in src/libs/zbxmedia/email.c
[
{
"source": "https://github.com/zabbix/zabbix/commit/55e9f3b67c4db700b4946f166e69a401b93e2598",
"id": "CVE-2024-42333-3e163149",
"deprecated": false,
"target": {
"file": "src/zabbix_java/src/com/zabbix/gateway/GeneralInformation.java"
},
"signature_version": "v1",
"digest": {
"threshold": 0.9,
"line_hashes": [
"115154101360858030922981434055701150851",
"195570750560698842948592063162645571807",
"229777919597073440585547007016699420692",
"310281707359805902864494292389069723081",
"49944654822291915530385878933710200727",
"285971086933706543778601192121026144741"
]
},
"signature_type": "Line"
}
]