fkie_cve-2023-39206
Vulnerability from fkie_nvd
Published
2023-11-14 23:15
Modified
2024-11-21 08:14
Severity ?
3.7 (Low) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
Buffer overflow in some Zoom clients may allow an unauthenticated user to conduct a denial of service via network access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zoom | meetings | * | |
zoom | meetings | * | |
zoom | meetings | * | |
zoom | meetings | * | |
zoom | meetings | * | |
zoom | rooms | * | |
zoom | rooms | * | |
zoom | rooms | * | |
zoom | rooms | * | |
zoom | video_software_development_kit | * | |
zoom | video_software_development_kit | * | |
zoom | video_software_development_kit | * | |
zoom | video_software_development_kit | * | |
zoom | video_software_development_kit | * | |
zoom | virtual_desktop_infrastructure | * | |
zoom | virtual_desktop_infrastructure | * | |
zoom | zoom | * | |
zoom | zoom | * | |
zoom | zoom | * | |
zoom | zoom | * | |
zoom | zoom | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:android:*:*", "matchCriteriaId": "249D7C05-850F-4BED-BE1B-864B3A555DC5", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "CF877945-AEBB-4347-B45C-DC5CF711EAC0", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:linux:*:*", "matchCriteriaId": "E7C90882-B6EB-476E-B8C8-9CA9D2C86328", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:macos:*:*", "matchCriteriaId": "C00191F0-BCF9-4200-8953-B1DD1E0DBA3F", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:meetings:*:*:*:*:*:windows:*:*", "matchCriteriaId": "E80CFF3B-0BF6-4EF4-878B-B037B5DF1BC5", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:android:*:*", "matchCriteriaId": "12D81D70-FA29-4921-9A20-BE8DC596F6AE", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipad_os:*:*", "matchCriteriaId": "141007D5-4A8B-48C3-8BFB-EAF8BC3EF905", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*", "matchCriteriaId": "3D39B6BA-D4BC-4502-8867-D5A5441D3196", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "matchCriteriaId": "62689640-F0DA-4FBA-83A9-AA29843B6E57", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:android:*:*", "matchCriteriaId": "440B9710-9B66-4F17-A4EE-C1D11DF4DC76", "versionEndExcluding": "1.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "B3F99428-4438-47DA-BD2D-FF61BF1CC736", "versionEndExcluding": "1.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:linux:*:*", "matchCriteriaId": "392358DF-EC53-4538-A361-F467B8DFEE8B", "versionEndExcluding": "1.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:macos:*:*", "matchCriteriaId": "1E1A90A2-8B2E-481F-95D6-FB9E85B951CD", "versionEndExcluding": "1.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:windows:*:*", "matchCriteriaId": "33188B54-F6E1-4556-8A90-9DD7384AF299", "versionEndExcluding": "1.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D26E2D3-9148-44AA-8AF0-A3E58704F532", "versionEndExcluding": "5.14.13", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3B28CE5-ABB5-43C4-8BB4-133050E0821E", "versionEndExcluding": "5.15.11", "versionStartIncluding": "5.15.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:android:*:*", "matchCriteriaId": "A454D523-527C-4910-8474-EB4CDFFE7BF6", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "BE96C026-8B39-4509-BA4F-AC224918DC8F", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:linux:*:*", "matchCriteriaId": "7EB1DC6F-6270-40C4-804F-7EEC18A62FE8", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:macos:*:*", "matchCriteriaId": "E055EB88-5A25-4348-AAEA-5A25496E5E64", "versionEndExcluding": "5.16.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:zoom:zoom:*:*:*:*:*:windows:*:*", "matchCriteriaId": "1BF6E442-FE5C-46AF-AE37-4D5A9AB56A3D", "versionEndExcluding": "5.16.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in some Zoom clients may allow an unauthenticated user to conduct a denial of service via network access." }, { "lang": "es", "value": "El desbordamiento del b\u00fafer en algunos clientes de Zoom puede permitir que un usuario no autenticado realice una denegaci\u00f3n de servicio a trav\u00e9s del acceso a la red." } ], "id": "CVE-2023-39206", "lastModified": "2024-11-21T08:14:54.847", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 1.4, "source": "security@zoom.us", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-14T23:15:09.073", "references": [ { "source": "security@zoom.us", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://explore.zoom.us/en/trust/security/security-bulletin/" } ], "sourceIdentifier": "security@zoom.us", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "security@zoom.us", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-120" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.