Use-After-Free Bug in Zbxembed Browser
CVE-2024-42331

3.3LOW

Key Information:

Vendor

Zabbix

Status
Vendor
CVE Published:
27 November 2024

What is CVE-2024-42331?

The vulnerability arises within the src/libs/zbxembed/browser.c file, specifically in the method es_browser_ctor, which retrieves a heap pointer from the Duktape JavaScript engine. If this heap pointer is later freed by garbage collection, the browser_push_error method within the src/libs/zbxembed/browser_error.c file could encounter a use-after-free situation, leading to undefined behavior that may impact the overall stability and security of the application.

Affected Version(s)

Zabbix 7.0.0 <= 7.0.3

References

CVSS V3.1

Score:
3.3
Severity:
LOW
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

Credit

Zabbix wants to thank chamal for submitting this report on the HackerOne bug bounty platform.
.
CVE-2024-42331 : Use-After-Free Bug in Zbxembed Browser