![]() ![]() ![]() Zoom has addressed this issue in the latest releases of the products listed in the section below. This issue could be used to potentially gain insight into arbitrary areas of the product’s memory. Source: Reported by Johnny Yu of Walmart Global TechĬVSS Vector String: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:Nĭescription: A vulnerability was discovered in the products listed in the "Affected Products" section of this bulletin which potentially allowed for the exposure of the state of process memory. All Zoom Client for Meetings for Windows before version 5.6.3.All Zoom Client for Meetings for macOS before version 5.7.3.All Zoom Client for Meetings for Linux before version 5.8.6.All Zoom Client for Meetings for iOS before version 5.9.0.All Zoom Client for Meetings for Android before version 5.8.6.Users can help keep themselves secure by applying current updates or downloading the latest Zoom software with all current security updates from. This could lead to availability issues on the client host by exhausting system resources. CVSS Vector String: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:Lĭescription: The Zoom Client for Meetings chat functionality was susceptible to Zip bombing attacks in the following product versions: Android before version 5.8.6, iOS before version 5.9.0, Linux before version 5.8.6, macOS before version 5.7.3, and Windows before version 5.6.3.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |