Important Notice: Please begin updating all your clients to Zoom 5.0. After May 30, 2020, all Zoom clients on older versions will receive a forced upgrade when trying to join meetings as GCM Encryption will be fully enabled across the Zoom platform. Click here for more information on the changes and how to update your Zoom application or download now.

Note: As our world comes together to slow the spread of COVID-19 pandemic, the Zoom Support Center has continued to operate 24x7 globally to support you. Please see the updated Support Guidelines during these unprecedented times.



Security: GHOST Vulnerability Follow

Overview

The GHOST vulnerability is a 'buffer overflow' bug affecting the gethostbyname() and gethostbyname2() function calls in the glibc library. This vulnerability allows a remote attacker that is able to make an application call to either of these functions to execute arbitrary code with the permissions of the user running the application.

What components of Zoom may be affected?

If you installed Meeting Connector, Virtual Room Connector or Telephone Connector/Gateway that runs

  • CentOS Linux version 5.x, 6.x & 7.x

Please do the following to update to the glibc library

  • Sign into the server by SSH as root
  • Run command:  yum update glibc

New installation of Meeting Connector, Virtual Room Connector or Telephone Connector/Gateway are patched.