[ authorization ] [ registration ] [ Restaurar ]
Contactanos
No puedes contactar por:
0day.today Exploits Market and 0day Exploits Database

Zoom Linux Client 2.0.106600.0904 Buffer Overflow Vulnerability

[ 0Day-ID-29242 ]
Titulo completo
Zoom Linux Client 2.0.106600.0904 Buffer Overflow Vulnerability [ Highlight ]
Highlight - is paid service, that can help to get more visitors to your material.

Price:
Fecha
Categoria
Platforma
Verificado
Precio
gratis
Riesgo
[
Security Risk High
]
Rel. releases
Descripcion
The binary /opt/zoom/ZoomLauncher is vulnerable to a buffer overflow because it concatenates a overly long user input to a stack variable without checking if the destination buffer is long enough to hold the data. The binary also has important security features like canary turned off. The client registers a scheme handler (zoommtg://) and this makes possible to trigger the vulnerability remotely. Version 2.0.106600.0904 is affected.
CVE
CVE-2017-15048
Other Information
Abuses
0
Comentarios
0
Vistas
3 369
We DO NOT use Telegram or any messengers / social networks! We DO NOT use Telegram or any messengers / social networks! Please, beware of scammers!
gratis
Open Exploit
You can open this source code for free
Open Exploit
Open Exploit
You can open this source code for free
Verified by
Verified by
This material is checked by Administration and absolutely workable.
BL
29
Exploits
2
Lectores
0
[ Comentarios: 0 ]
Terms of use of comments:
  • Users are forbidden to exchange personal contact details
  • Haggle on other sites\projects is forbidden
  • Reselling is forbidden
Punishment: permanent block of user account with all Gold.

Entra o registrate para dejar comentarios