Vigilance.fr - Zabbix: use after free via browser_push_error(), analyzed on 09/12/2024

An attacker can force the reuse of a freed memory area of Zabbix, via browser_push_error(), in order to trigger a denial of service, and possibly to run code. - Security Vulnerability

Fév 9, 2025 - 16:08
 0
Vigilance.fr - Zabbix: use after free via browser_push_error(), analyzed on 09/12/2024

An attacker can force the reuse of a freed memory area of Zabbix, via browser_push_error(), in order to trigger a denial of service, and possibly to run code.