[technology taskforce] vulnerability in the Mac Zoom Client

Olivier MJ Crépin-Leblond ocl at gih.com
Tue Jul 9 19:18:11 UTC 2019


Dear Dev,

this topic has arisen on tonight's EURALO monthly call.
Since ICANN pulled out Adobe Connect on Security Issues in the not so
distant past, our European users are asking what is ICANN's evaluation
of this vulnerability - with request for an URGENT response as a matter
of priority as Zoom is ICANN's primary means of Conferencing these days.
Kindest regards,

Olivier

On 09/07/2019 05:58, Dev Anand Teelucksingh wrote:
>
>
>     A vulnerability in the Mac Zoom Client allows any malicious
>     website to enable your camera without your permission.
>
>
> Read the medium blog post by Jonathan Leitschuh
> https://medium.com/@jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5
>
> _______________________________________________
> ttf mailing list
> ttf at atlarge-lists.icann.org
> https://mm.icann.org/mailman/listinfo/ttf
>
> _______________________________________________
> By submitting your personal data, you consent to the processing of your personal data for purposes of subscribing to this mailing list accordance with the ICANN Privacy Policy (https://www.icann.org/privacy/policy) and the website Terms of Service (https://www.icann.org/privacy/tos). You can visit the Mailman link above to change your membership status or configuration, including unsubscribing, setting digest-style delivery or disabling delivery altogether (e.g., for a vacation), and so on.

-- 
Olivier MJ Crépin-Leblond, PhD
http://www.gih.com/ocl.html

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mm.icann.org/pipermail/ttf/attachments/20190709/fb1bc259/attachment.html>


More information about the ttf mailing list