Vulnerability CVE-2019-13567


Published: 2019-07-12

Description:
The Zoom Client before 4.4.53932.0709 on macOS allows remote code execution, a different vulnerability than CVE-2019-13450. If the ZoomOpener daemon (aka the hidden web server) is running, but the Zoom Client is not installed or can't be opened, an attacker can remotely execute code with a maliciously crafted launch URL. NOTE: ZoomOpener is removed by the Apple Malware Removal Tool (MRT) if this tool is enabled and has the 2019-07-10 MRTConfigData.

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
ZOOM -> Client 

 References:
https://gist.github.com/wbowling/13f9f90365c171806b9ffba2c841026b
https://support.zoom.us/hc/en-us/articles/201361963-New-Updates-for-Mac-OS
https://twitter.com/JLLeitschuh/status/1149420685405708295
https://twitter.com/JLLeitschuh/status/1149422543658520578
https://twitter.com/riskybusiness/status/1149125147019767814
https://twitter.com/wcbowling/status/1149457231504498689
https://twitter.com/wcbowling/status/1166998107667619841

Copyright 2024, cxsecurity.com

 

Back to Top