@zoom/rtms is vulnerable to Use After Free
61
Medium Risk
Affected versions of this package are vulnerable to use-after-free due to improper lifetime management of internally allocated media buffers and callback objects. The affected logic may continue to reference memory after it has been released during asynchronous stream processing, cleanup, or event callback handling. An attacker able to trigger specific connection, teardown, or data-processing sequences can cause the application to access freed memory, potentially leading to crashes, memory corruption, or undefined behavior.
You are affected if you are using a version that falls within the vulnerable range.
@zoom/rtms is vulnerable to Use After Free in versions 1.0.0 - 1.0.3.
Upgrade the @zoom/rtms library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant