[Gnso-newgtld-wg] Please specify & Clarify is My Privacy at Risk?

Alexander Schubert alexander at schubert.berlin
Wed Jul 10 11:47:11 UTC 2019


Hi Rubens,

 

OMG. And do we have to do anything, or is Zoom updating the software (Windows; Android) automatically? Do we need to “patch” smth, delete the application and reinstall? (I for example do not use Mac/Apple – only Android and Windows).

Thanks for the warning,

 

Alexander

 

 

 

From: Gnso-newgtld-wg [mailto:gnso-newgtld-wg-bounces at icann.org] On Behalf Of Rubens Kuhl
Sent: Wednesday, July 10, 2019 1:50 PM
To: Vaibhav Aggarwal, Catalyst & Group CEO <va at bladebrains.com>
Cc: goran.marby at icann.org; ericsyuan2011 at gmail.com; Priscilla McCarthy <priscilla.barolo at zoom.us>; Dorrain, Kristine via Gnso-newgtld-wg <gnso-newgtld-wg at icann.org>; Zoom Press <press at zoom.us>
Subject: Re: [Gnso-newgtld-wg] Please specify & Clarify is My Privacy at Risk?

 

 

VA,

 

It's customary in the information security practice to not disclose vulnerabilities before a solution is provided by the software author, in order to better serve public interest. And this process was followed in this case by both the security researcher that identified it and Zoom and Zoom itself, but in the end it was clear that Zoom was not willing to change the architecture to really solve the problem. That made the security researcher disclose the vulnerability at the end of the customary 3-month period, which forced Zoom's hand and starting version 4.4.4 release 53932 it seems to be solved now. See https://support.zoom.us/hc/en-us/articles/201361963-New-Updates-for-Mac-OS . 

 

You can read more about responsible disclosure in https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Vulnerability_Disclosure_Cheat_Sheet.md . 

 

Zoom trying to downplay the severity of this vulnerability is indeed a problem; it was not low risk, and their attitude of thinking that prevented they fixed it in time, requiring a 0-day attack to be disclosed before they actually plugged the hole. Fixing people is harder than fixing software, and the handling of this does not bring any confidence to how they will handle other vulnerabilities in the future. The full recap published by the security researcher is worth reading:

https://medium.com/bugbountywriteup/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5

 

 

Rubens

 

 

 





On 10 Jul 2019, at 01:47, Vaibhav Aggarwal, Catalyst & Group CEO <va at bladebrains.com <mailto:va at bladebrains.com> > wrote:

 

Dear Priscillia,

 

I appreciate your response. But this is too little and too late. If there was a Vulnerability, why were we not informed earlier as a customer / User. Secondly, I will need to understand what is the extent of this vulnerability. By Saying “Low risk Vulnerability” it is clearly showing that you are not willing to elucidate and want to either brush it under the carpet or ignore or underplay the risk. 

 

This is a mandatory disclosure you need to do as it is my privacy at stake. This is Super Important. 

 

Regards,

-VA





On Jul 10, 2019, at 2:44 AM, Priscilla McCarthy <priscilla.barolo at zoom.us <mailto:priscilla.barolo at zoom.us> > wrote:

 

Hi there Vaibhav,

Thank you for your email. These are low-risk vulnerabilities that apply only to Mac users, and we have drafted a blog post discussing them. We are updating our service tonight and this coming weekend. When you see prompted updates, you should update your Zoom app to ensure your security. Here is more information: https://blog.zoom.us/wordpress/2019/07/08/response-to-video-on-concern/

Thank you!




 <https://zoom.us/> 


Priscilla Barolo 


Manager, Communications 


Zoom Video Communications 


Call  <tel:650-438-9456> 650-438-9456 |    Click  <https://zoom.us/> zoom.us  |  Zoom  <http://zoom.us/j/650-438-9456> 650-438-9456 



 <http://www.facebook.com/zoomvideocommunications> 

 <http://www.twitter.com/zoom_us> 

 <http://www.linkedin.com/company/zoom-video-communications-inc-/> 

 <https://zoom.us/referrals> 



  <https://smart.zoom.us/v2/imagebucket/zoom.us/1x1.png> 

  <https://smart.zoom.us/v2/imagebucket/zoom.us/1x1.png> 

  <https://smart.zoom.us/v2/imagebucket/zoom.us/1x1.png> 



 <https://smart.zoom.us/v2/a/zoomtopia19/5d2503c401ca44fa0d942282-OjqXg/httpszoomtopia.us> 

 

 

On Tue, Jul 9, 2019 at 12:20 PM Vaibhav Aggarwal <va at thevaibhav.com <mailto:va at thevaibhav.com> > wrote:

Dear Eric,

 

I am in receipt of this following email content : 

 

Hey - remember when ICANN switched everyone from Adobe over to Zoom as a way of enhancing information security and data privacy?

 

"A vulnerability in the Mac Zoom Client allows any malicious website to enable your camera without your permission... This vulnerability allows any website to forcibly join a user to a Zoom call, with their video camera activated, without the user's permission. On top of this, this vulnerability would have allowed any webpage to DOS (Denial of Service) a Mac by repeatedly joining a user to an invalid call. Additionally, if you’ve ever installed the Zoom client and then uninstalled it, you still have a localhost web server on your machine that will happily re-install the Zoom client for you, without requiring any user interaction on your behalf besides visiting a webpage. This re-install ‘feature’ continues to work to this day."

 

Read more here: https://medium.com/@jonathan.leitschuh/zoom-zero-day-4-million-webcams-maybe-an-rce-just-get-them-to-visit-your-website-ac75c83f4ef5

 

Please Clarify if my privacy at risk. And the steps taken to protect my privacy.

 

Regards,

 

Vaibhav Aggarwal

New Delhi, India

vaibhavaggarwal.com <http://vaibhavaggarwal.com/>  

twitter.com/thevaibhag <http://twitter.com/thevaibhag> 

youtube.com/+vaibhavaggarwalindia <http://youtube.com/+vaibhavaggarwalindia>   

 

_______________________________________________
Gnso-newgtld-wg mailing list
Gnso-newgtld-wg at icann.org <mailto:Gnso-newgtld-wg at icann.org> 
https://mm.icann.org/mailman/listinfo/gnso-newgtld-wg
_______________________________________________
By submitting your personal data, you consent to the processing of your personal data for purposes of subscribing to this mailing list accordance with the ICANN Privacy Policy (https://www.icann.org/privacy/policy) and the website Terms of Service (https://www.icann.org/privacy/tos). You can visit the Mailman link above to change your membership status or configuration, including unsubscribing, setting digest-style delivery or disabling delivery altogether (e.g., for a vacation), and so on.

 

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mm.icann.org/pipermail/gnso-newgtld-wg/attachments/20190710/9c0d67dc/attachment.html>


More information about the Gnso-newgtld-wg mailing list