mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
134 lines
5.1 KiB
JSON
134 lines
5.1 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "security@zoom.us",
|
|
"DATE_PUBLIC": "2022-02-08T12:00:00.000Z",
|
|
"ID": "CVE-2022-22780",
|
|
"STATE": "PUBLIC",
|
|
"TITLE": "Zoom Chat Susceptible to Zip Bombing"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Zoom Client for Meetings for Android",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "5.8.6"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Zoom Client for Meetings for iOS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "5.9.0"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Zoom Client for Meetings for Linux",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "5.8.6"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Zoom Client for Meetings for macOS",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "5.7.3"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "Zoom Client for Meetings for Windows",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "<",
|
|
"version_value": "5.6.3"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "Zoom Video Communications Inc"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"credit": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Johnny Yu of Walmart Global Tech"
|
|
}
|
|
],
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The Zoom Client for Meetings chat functionality was susceptible to Zip bombing attacks in the following product versions: Android before version 5.8.6, iOS before version 5.9.0, Linux before version 5.8.6, macOS before version 5.7.3, and Windows before version 5.6.3. This could lead to availability issues on the client host by exhausting system resources."
|
|
}
|
|
]
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "LOW",
|
|
"baseScore": 4.7,
|
|
"baseSeverity": "MEDIUM",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"privilegesRequired": "NONE",
|
|
"scope": "CHANGED",
|
|
"userInteraction": "REQUIRED",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L",
|
|
"version": "3.1"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Allocation of Resources Without Limits or Throttling"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"refsource": "MISC",
|
|
"url": "https://explore.zoom.us/en/trust/security/security-bulletin",
|
|
"name": "https://explore.zoom.us/en/trust/security/security-bulletin"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"discovery": "USER"
|
|
}
|
|
} |