Description
An exploitable partial path traversal vulnerability exists in the way Zoom Client version 4.6.10 processes messages including shared code snippets. A specially crafted chat message can cause an arbitrary binary planting which could be abused to achieve arbitrary code execution. An attacker needs to send a specially crafted message to a target user or a group to trigger this vulnerability. For the most severe effect, target user interaction is required.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-27264 | An exploitable partial path traversal vulnerability exists in the way Zoom Client version 4.6.10 processes messages including shared code snippets. A specially crafted chat message can cause an arbitrary binary planting which could be abused to achieve arbitrary code execution. An attacker needs to send a specially crafted message to a target user or a group to trigger this vulnerability. For the most severe effect, target user interaction is required. |
References
History
No history.
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2024-08-04T08:47:41.068Z
Reserved: 2020-01-07T00:00:00.000Z
Link: CVE-2020-6110
No data.
Status : Modified
Published: 2020-06-08T14:15:13.070
Modified: 2024-11-21T05:35:07.020
Link: CVE-2020-6110
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD