Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.118173
Categoría:Buffer overflow
Título:Zoom Client Heap Based Buffer Overflow (ZSB-22003)
Resumen:Zoom Client is prone to a heap based buffer overflow; vulnerability.
Descripción:Summary:
Zoom Client is prone to a heap based buffer overflow
vulnerability.

Vulnerability Insight:
The vulnerability allows remote attackers to execute arbitrary
code on affected installations of Zoom Clients. Authentication is not required to exploit this
vulnerability.

The specific flaw exists within the processing of encrypted messages. The issue results from the
lack of proper validation of the length of user-supplied data prior to copying it to a
fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the
context of the current user.

Affected Software/OS:
All desktop versions of the Zoom Client for Meetings before
5.6.3.

Solution:
Update to version 5.6.3 or later.

CVSS Score:
9.0

CVSS Vector:
AV:N/AC:L/Au:S/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2021-30480
https://blog.malwarebytes.com/exploits-and-vulnerabilities/2021/04/zoom-zero-day-discovery-makes-calls-safer-hackers-200000-richer/
https://explore.zoom.us/en/trust/security/security-bulletin/
https://sector7.computest.nl/post/2021-08-zoom/
https://twitter.com/thezdi/status/1379855435730149378
https://twitter.com/thezdi/status/1379859851061395459
https://www.securityweek.com/200000-awarded-zero-click-zoom-exploit-pwn2own
https://www.zdnet.com/article/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/
https://www.zerodayinitiative.com/advisories/ZDI-21-971/
https://zoom.us/feature/messaging
Common Vulnerability Exposure (CVE) ID: CVE-2021-34407
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.