TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Zoom RCE from Pwn2Own 2021

262 pointsby xnyhpsover 3 years ago

9 comments

sriram_sunover 3 years ago
FTA: &quot;Using a combination of proxies, modified DNS records, sslsplit and a new CA certificate installed in Windows, we were able to inspect all traffic, including HTTP and XMPP, in our test environment.&quot;<p>I have setup wireshark for troubleshooting. That&#x27;s about it. What&#x27;s the role of proxies, modified DNS records etc. in this setup? How can I duplicate this?<p>Thanks.
评论 #28341002 未加载
评论 #28341257 未加载
评论 #28340826 未加载
评论 #28354140 未加载
评论 #28340844 未加载
mvanaltvorstover 3 years ago
It blows my mind that there are people who manage to find exploit chains like these, amazing job!
评论 #28342587 未加载
评论 #28342394 未加载
skybrianover 3 years ago
This presumably doesn&#x27;t apply to the web app, which is the only way I&#x27;ve used Zoom.
johnchristopherover 3 years ago
Are there any cases or instances of secrets leaking from a zoom meeting through hacking ? Specifically from audio and video, not chat ?
titzerover 3 years ago
&gt; This meant that by sending a ResponseKey message with an AES-encrypted &lt;encoded&gt; element of more than 1024 bytes, it was possible to overflow a heap buffer.<p>This is what I was looking for. Fundamental bug was an overflow of statically-allocated buffer leading to heap corruption.<p>We gotta get off memory-unsafe languages.
评论 #28342399 未加载
评论 #28347643 未加载
评论 #28342226 未加载
makeworldover 3 years ago
This is why I only run Zoom in Firejail.
评论 #28341222 未加载
评论 #28341582 未加载
评论 #28341221 未加载
beermonsterover 3 years ago
Although they don’t make it easy to find the link, you can use Zoom in a browser which is the best way of limiting the damage it can cause if you <i>have</i> to use it in the first place.
avnigoover 3 years ago
Anyone know what logging&#x2F;printing library exploit.py is using in that first embedded video?
评论 #28345671 未加载
swileyover 3 years ago
No one should be installing native apps for this now that we have WebRTC.
评论 #28340549 未加载
评论 #28340229 未加载
评论 #28341306 未加载
评论 #28340043 未加载
评论 #28340243 未加载
评论 #28340353 未加载
评论 #28341355 未加载
评论 #28340382 未加载
评论 #28343809 未加载
评论 #28340561 未加载
评论 #28341131 未加载
评论 #28339963 未加载