The Zoom Client before 4.4.53932.0709 on macOS allows remote code execution, a different vulnerability than CVE-2019-13450. If the ZoomOpener daemon (aka the hidden web server) is running, but the Zoom Client is not installed or can't be opened, an attacker can remotely execute code with a maliciously crafted launch URL. NOTE: ZoomOpener is removed by the Apple Malware Removal Tool (MRT) if this tool is enabled and has the 2019-07-10 MRTConfigData.
References
Configurations
History
21 Nov 2024, 04:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://gist.github.com/wbowling/13f9f90365c171806b9ffba2c841026b - Third Party Advisory | |
References | () https://support.zoom.us/hc/en-us/articles/201361963-New-Updates-for-Mac-OS - Release Notes, Vendor Advisory | |
References | () https://twitter.com/JLLeitschuh/status/1149420685405708295 - Third Party Advisory | |
References | () https://twitter.com/JLLeitschuh/status/1149422543658520578 - Third Party Advisory | |
References | () https://twitter.com/riskybusiness/status/1149125147019767814 - Third Party Advisory | |
References | () https://twitter.com/wcbowling/status/1149457231504498689 - Exploit, Third Party Advisory | |
References | () https://twitter.com/wcbowling/status/1166998107667619841 - Third Party Advisory |
Information
Published : 2019-07-12 04:15
Updated : 2024-11-21 04:25
NVD link : CVE-2019-13567
Mitre link : CVE-2019-13567
CVE.ORG link : CVE-2019-13567
JSON object : View
Products Affected
zoom
- zoom
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')