First published: Tue Jun 13 2023(Updated: )
Buffer copy without checking size of input in Zoom Meeting SDK before 5.13.0 may allow an authenticated user to potentially enable a denial of service via local access. This issue may result in the Zoom Meeting SDK to crash and need to be restarted.
Credit: security@zoom.us
Affected Software | Affected Version | How to fix |
---|---|---|
Zoom Meeting SDK | <5.13.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-34115 is medium.
CVE-2023-34115 may allow an authenticated user to potentially enable a denial of service via local access in the Zoom Meeting SDK before version 5.13.0.
CVE-2023-34115 can be exploited by an authenticated user through local access to potentially cause a denial of service by triggering a buffer copy without checking size of input.
To mitigate CVE-2023-34115, it is recommended to update Zoom Meeting SDK to version 5.13.0 or later.
You can find more information about CVE-2023-34115 in the Zoom Meeting SDK Security Bulletin.