Tucson Managed, IT Services, Computer Repair Company

Zoom Security Flaw Threat Advisory

Zoom slapped a “high-severity” rating on the more serious of the two vulnerabilities (CVE-2021-34423) and warned that the issue also affects a wide range of downstream components and SDKs.

“This can potentially allow a malicious actor to crash the service or application, or leverage this vulnerability to execute arbitrary code,” Zoom said in a barebones advisory listing a range of affected products. The bug is described as a buffer overflow with a CVSS base score of 7.3.

Zoom also fixed a second memory corruption vulnerability (CVE-2021-34424) that allowed for the exposure of the state of process memory in multiple products and components.

“This issue could be used to potentially gain insight into arbitrary areas of the product’s memory,” according to Zoom’s advisory.

Here’s the full list of affected Zoom products:

Zoom also added a new automatic updating mechanism to the desktop version of the software to help users find and apply security patches in a timely manner.

Earlier this month, Zoom patched multiple high-risk security vulnerabilities affecting its on-premises Meeting Connector software and the popular Keybase Client.

Related: US$200,000 Awarded for Zero-Click Zoom Exploit at Pwn2Own

Related: FTC Says Zoom Misled Users on Its Security for Meetings.

Exit mobile version