TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Zoom macOS app quietly added back cs.disable-library-validation entitlement

123 点作者 nuker将近 3 年前
So the CVE-2020-11470 is back.<p>“This effectively disables code signature verification for its dynamic libraries and enables a code injection attack that Wardle calls &quot;dylib proxying&quot;. It&#x27;s not clear why Zoom uses this exception since its own libraries appear to be properly signed.”<p><a href="https:&#x2F;&#x2F;www.csoonline.com&#x2F;article&#x2F;3535789&#x2F;weakness-in-zoom-for-macos-allows-local-attackers-to-hijack-camera-and-microphone.amp.html" rel="nofollow">https:&#x2F;&#x2F;www.csoonline.com&#x2F;article&#x2F;3535789&#x2F;weakness-in-zoom-f...</a><p>Check latest pkg with Suspicious Package [0] analyzer.<p>[0] <a href="https:&#x2F;&#x2F;www.mothersruin.com&#x2F;software&#x2F;SuspiciousPackage&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.mothersruin.com&#x2F;software&#x2F;SuspiciousPackage&#x2F;</a>

3 条评论

pvg将近 3 年前
Big thread the other day:<p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=32447339" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=32447339</a>
评论 #32461762 未加载
评论 #32464302 未加载
评论 #32462142 未加载
nuker将近 3 年前
Copying back the removed comment:<p>“The appeal of injection a library into Zoom, revolves around its (user-granted) access to the mic and camera. Once our malicious library is loaded into Zoom’s process&#x2F;address space, the library will automatically inherit any&#x2F;all of Zooms access rights&#x2F;permissions!<p>This means that if the user as given Zoom access to the mic and camera (a more than likely scenario), our injected library can equally access those devices.”<p><a href="https:&#x2F;&#x2F;objective-see.org&#x2F;blog&#x2F;blog_0x56.html" rel="nofollow">https:&#x2F;&#x2F;objective-see.org&#x2F;blog&#x2F;blog_0x56.html</a>
jupenur将近 3 年前
There&#x27;s an even more ubiquitous app that also usually has mic and camera permissions and suffers from a similar (but technically unrelated) local code injection issue: Chrome. The bug is described here [0] and was closed as WontFix because &quot;if your machine is compromised, it&#x27;s beyond the scope of anything Chrome can do about it&quot;.<p>Even if you don&#x27;t use Chrome, you probably have at least a few Electron apps installed; they all suffer from the same issue.<p>The only logical conclusion is the macOS privacy model, TCC, is doomed. There&#x27;s always an app that has non-default TCC permissions and is vulnerable to some type of local code injection, and at that point any malicious app can also access those TCC-protected features.<p>[0] <a href="https:&#x2F;&#x2F;crbug.com&#x2F;1300121" rel="nofollow">https:&#x2F;&#x2F;crbug.com&#x2F;1300121</a>