The researcher is showing that it is possible to leak a small amount of Zabbix Server memory using an out of bounds read in src/libs/zbxmedia/email.c
[ { "deprecated": false, "id": "CVE-2024-42333-3e163149", "signature_type": "Line", "target": { "file": "src/zabbix_java/src/com/zabbix/gateway/GeneralInformation.java" }, "digest": { "line_hashes": [ "115154101360858030922981434055701150851", "195570750560698842948592063162645571807", "229777919597073440585547007016699420692", "310281707359805902864494292389069723081", "49944654822291915530385878933710200727", "285971086933706543778601192121026144741" ], "threshold": 0.9 }, "source": "https://github.com/zabbix/zabbix/commit/55e9f3b67c4db700b4946f166e69a401b93e2598", "signature_version": "v1" } ]