Zoom Client for Meetings through 4.6.8 on macOS copies runwithroot to a user-writable temporary directory during installation, which allows a local process (with the user's privileges) to obtain root access by replacing runwithroot.
The product makes files or directories accessible to unauthorized actors, even though they should not be.
Link | Tags |
---|---|
https://objective-see.com/blog/blog_0x56.html | third party advisory exploit |
https://blog.zoom.us/wordpress/2020/04/01/a-message-to-our-users/ | vendor advisory |