It doesn't specifically mention 1.1 but it probably couldn't hurt pumping up to 1.1.5 imho. A vulnerability has been reported in ZABBIX, which can be exploited by malicious people to cause a DoS (Denial of Service) or to compromise a vulnerable system. The vulnerability is caused due to a boundary error when processing SNMP responses. This can be exploited to cause a buffer overflow via a specially crafted SNMP packet containing an invalid IP address and may allow execution of arbitrary code. Successful exploitation requires knowledge about a monitored SNMP device or SNMP daemon. The vulnerability is reported in version 1.1.2, 1.1.3, and 1.1.4. Solution: Update to version 1.1.5. Reproducible: Didn't try http://www.zabbix.com/rn1.1.5.php
Committed =net-analyzer/zabbix-{agent,frontend,server}-1.1.6. I suppose zabbix-server is the relevant package.
Thanks Wolfram, since there is no stable ebuild in any arch for zabbix-server, i close the bug. Feel free to reopen if you disagree.