CVE-2024-42331Use After Free in Zabbix

CWE-416Use After Free5 documents5 sources
Severity
3.3LOWNVD
EPSS
0.0%
top 86.40%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 27

Description

In the src/libs/zbxembed/browser.c file, the es_browser_ctor method retrieves a heap pointer from the Duktape JavaScript engine. This heap pointer is subsequently utilized by the browser_push_error method in the src/libs/zbxembed/browser_error.c file. A use-after-free bug can occur at this stage if the wd->browser heap pointer is freed by garbage collection.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:LExploitability: 1.8 | Impact: 1.4

Affected Packages3 packages

NVDzabbix/zabbix7.0.07.0.4
Debianzabbix/zabbix< 1:5.0.45+dfsg-1+deb11u1+2
CVEListV5zabbix/zabbix7.0.07.0.3

🔴Vulnerability Details

3
CVEList
Use after free in browser_push_error2024-11-27
GHSA
GHSA-xq5v-w2v7-hg7j: In the src/libs/zbxembed/browser2024-11-27
OSV
CVE-2024-42331: In the src/libs/zbxembed/browser2024-11-27

📋Vendor Advisories

1
Debian
CVE-2024-42331: zabbix - In the src/libs/zbxembed/browser.c file, the es_browser_ctor method retrieves a ...2024