The researcher is showing that it is possible to leak a small amount of Zabbix Server memory using an out of bounds read in src/libs/zbxmedia/email.c
The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.
| Name | Vendor | Start Version | End Version | 
|---|---|---|---|
| Zabbix | Zabbix | 6.0.0 (including) | 6.0.34 (excluding) | 
| Zabbix | Zabbix | 6.4.0 (including) | 6.4.19 (excluding) | 
| Zabbix | Zabbix | 7.0.0 (including) | 7.0.4 (excluding) | 
| Zabbix | Ubuntu | focal | * | 
| Zabbix | Ubuntu | oracular | * | 
| Zabbix | Ubuntu | trusty/esm | * | 
| Zabbix | Ubuntu | upstream | * |