• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • About Us
  • Contact Us
  • Block Examples
  • Landing Page

iHash

News and How to's

  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

Researcher Demonstrates Several Zoom Vulnerabilities at DEF CON 28

Aug 10, 2020 by iHash Leave a Comment

Popular video conferencing app Zoom has addressed several security vulnerabilities, two of which affect its Linux client that could have allowed an attacker with access to a compromised system to read and exfiltrate Zoom user data—and even run stealthy malware as a sub-process of a trusted application.

According to cybersecurity researcher Mazin Ahmed, who presented his findings at DEF CON 2020 yesterday, the company also left a misconfigured development instance exposed that wasn’t updated since September 2019, indicating the server could be susceptible to flaws that were left unpatched.

After Ahmed privately reported the issues to Zoom in April and subsequently in July, the company issued a fix on August 3 (version 5.2.4).

cybersecurity

It’s worth noting that for some of these attacks to happen, an attacker would need to have already compromised the victim’s device by other means. But that doesn’t take away the significance of the flaws.

In one scenario, Ahmed uncovered an issue with the Zoom Launcher for Linux that could allow an adversary to run unauthorized software owing to the manner it launches the “zoom” executable.

“This breaks all of the protection of application whitelisting, allows malware to run as a subprocess of a trusted vendor (Zoom), and is a bad design/security practice by all means,” Ahmed said in an analysis.

Kerberos authentication

That’s not all. In a similar vein, an attacker with access to the victim’s machine can read and exfiltrate Zoom user data and configuration by navigating to the local database and even accessing chat messages stored on the system in plaintext format.

Two other flaws involved an externally accessible Kerberos authentication service (“ca01.idm.meetzoom.us”) and a TLS/SSL issue that lets malware inject custom certificate fingerprints into the local Zoom database.

“This is per user certificate pinning and intentionally allows for the user to allow custom certificates,” Zoom said of the certificate injection flaw. “The user can write to their own database, but no other non-root users can. It’s common best practice to have user applications run at their privilege level, as requiring Zoom to run as root would introduce unnecessary security risks to Zoom and our customers.”

But it gets more interesting. Ahmed went on to highlight a memory leak vulnerability by exploiting the profile picture feature on Zoom to upload a malicious GIF image, download the rendered file, and extract data from it to leak portions of system memory.

image memory vulnerability

“After an internal investigation, we’ve concluded that the behavior was not a memory leak but just our image utility’s best effort at converting a malformed gif into a jpeg,” the company said.

Although Ahmed believes this to be a consequence of a known flaw in ImageMagick image conversion software (CVE-2017-15277), Zoom has said it doesn’t use the utility to convert GIFs uploaded as profile pictures into JPEG format.

Zoom Vulnerabilities

In response to the disclosures, Zoom has taken down the exposed Kerberos authentication server to prevent brute-force attacks, while also acknowledging that it’s working on addressing the lack of encryption while storing the chat logs.

It’s recommended that users update Zoom to the latest version to mitigate any risk arising out of these issues.

The development came as the company resolved a security flaw last month. It allowed attackers to crack the numeric passcode used to secure private meetings on the platform and eavesdrop on participants.

Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: Security Tagged With: computer security, CON, cyber attacks, cyber news, cyber security news, cyber security news today, cyber security updates, cyber updates, data breach, DEF, Demonstrates, hacker news, hacking news, how to hack, information security, network security, ransomware malware, researcher, software vulnerability, the hacker news, Vulnerabilities, zoom

Special Offers

  • Colors of the Rainbow Bolo Adjustable 7-9" 18K Gold Plated Bracelet for $10

    Colors of the Rainbow Bolo Adjustable 7-9" 18K Gold Plated Bracelet for $10
  • 18K Gold Plated Earrings with Faux Pearl & Micro-Pave Swarovski for $10

    18K Gold Plated Earrings with Faux Pearl & Micro-Pave Swarovski for $10
  • Google Nest NESTHELLO Video Doorbell for $229

    Google Nest NESTHELLO Video Doorbell for $229
  • Geometric Square 18K Gold Plated Necklace for $10

    Geometric Square 18K Gold Plated Necklace for $10
  • 3-Piece Linear Vertical Drop 18K Gold-Plated Necklace for $10

    3-Piece Linear Vertical Drop 18K Gold-Plated Necklace for $10

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

E-mail Newsletter

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

[eBook] Why Autonomous XDR Is Going to Replace NGAV/EDR

Apr 20, 2021 By iHash

Colors of the Rainbow Bolo Adjustable 7-9" 18K Gold Plated Bracelet for $10

Apr 20, 2021 By iHash

Tags

* Apple computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS iOS 7 iOS 8 iPad iPhone iPhone 6 Malware microsoft network security OS X Yosemite Privacy ransomware malware risk management security security breaches security vulnerabilities software vulnerability the hacker news update video web applications
Copyright iHash.eu © 2021
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

SAVE & ACCEPT