Zoom Client for Meetings through 4.6.8 on macOS copies runwithroot to a user-writable temporary directory during installation, which allows a local process (with the user's privileges) to obtain root access by replacing runwithroot.
References
Link | Resource |
---|---|
https://objective-see.com/blog/blog_0x56.html | Exploit Third Party Advisory |
https://blog.zoom.us/wordpress/2020/04/01/a-message-to-our-users/ | Vendor Advisory |
Configurations
Information
Published : 2020-04-01 15:15
Updated : 2022-07-12 10:42
NVD link : CVE-2020-11469
Mitre link : CVE-2020-11469
JSON object : View
CWE
CWE-552
Files or Directories Accessible to External Parties
Products Affected
zoom
- meetings