First published: Tue Aug 08 2023(Updated: )
Buffer overflow in Zoom Clients before 5.14.5 may allow an unauthenticated user to enable a denial of service via network access.
Credit: security@zoom.us security@zoom.us
Affected Software | Affected Version | How to fix |
---|---|---|
Zoom Rooms | <5.14.5 | |
Zoom Rooms | <5.14.5 | |
Zoom Rooms | <5.14.5 | |
Zoom Rooms | <5.14.5 | |
Zoom Virtual Desktop Infrastructure | <5.14.5 | |
Zoom Zoom | <5.14.5 | |
Zoom Zoom | <5.14.5 | |
Zoom Zoom | <5.14.5 | |
Zoom Zoom | <5.14.5 | |
Zoom Zoom | <5.14.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this buffer overflow vulnerability is CVE-2023-36532.
CVE-2023-36532 has a severity level of 7.5 (high).
Zoom Clients before version 5.14.5 are affected by CVE-2023-36532.
CVE-2023-36532 may allow an unauthenticated user to enable a denial of service via network access.
To fix CVE-2023-36532, you should upgrade your Zoom Clients to version 5.14.5 or later.