First published: Tue Dec 19 2017(Updated: )
Stack-based buffer overflow in the ZoomLauncher binary in the Zoom client for Linux before 2.0.115900.1201 allows remote attackers to execute arbitrary code by leveraging the zoommtg:// scheme handler.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zoom Zoom | <2.0.115900.1201 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15048 is a vulnerability in the Zoom client for Linux before version 2.0.115900.1201 that allows remote attackers to execute arbitrary code through a stack-based buffer overflow.
CVE-2017-15048 has a severity rating of 8.8 (high).
The Zoom client for Linux before version 2.0.115900.1201 is affected by CVE-2017-15048.
To fix CVE-2017-15048, update your Zoom client for Linux to version 2.0.115900.1201 or later.
You can find more information about CVE-2017-15048 in the following references: [1] [2] [3]