Notre sélection d'alertes et avis SSI.
Sources : US Cert, Cert EU, Cert FR, Cnil, VulDB.

jeudi 11 juillet 2019

Zoom Client up to 4.4.1 on MacOS ZoomOpener Daemon URL Remote Code Execution

A vulnerability was found in Zoom Client up to 4.4.1 on MacOS. It has been rated as critical. Affected by this issue is some unknown processing of the component ZoomOpener Daemon. The manipulation as part of a URL leads to a privilege escalation vulnerability (Code Execution). Using CWE to declare the problem leads to CWE-269. Impacted is confidentiality, integrity, and availability.

The weakness was published 07/12/2019. This vulnerability is handled as CVE-2019-13567 since 07/11/2019. The attack may be launched remotely. There are neither technical details nor an exploit publicly available.

Upgrading to version 4.4.2 eliminates this vulnerability.




CPE 2.3

CPE 2.2


VulDB Meta Base Score: 6.3
VulDB Meta Temp Score: 6.0

VulDB Base Score: 6.3
VulDB Temp Score: 6.0
VulDB Vector: 🔒
VulDB Reliability: 🔍


VulDB Base Score: 🔒
VulDB Temp Score: 🔒
VulDB Reliability: 🔍


Class: Privilege escalation / Code Execution (CWE-269)
Local: No
Remote: Yes

Availability: 🔒
Status: Not defined

Price Prediction: 🔍
Current Price Estimation: 🔒

Threat Intelligence

Threat: 🔍
Adversaries: 🔍
Geopolitics: 🔍
Economy: 🔍
Predictions: 🔍
Remediation: 🔍


Recommended: Upgrade
Status: 🔍

0-Day Time: 🔒

Upgrade: Client 4.4.2


07/11/2019 CVE assigned
07/12/2019 Advisory disclosed
07/12/2019 VulDB entry created
07/12/2019 VulDB last update


CVE: CVE-2019-13567 (🔒)


Created: 07/12/2019 09:37 AM
Complete: 🔍

Lien vers l'article source

Auteur: VulDB

Catégories: VulDBNombre de vues: 219


Événements SSI