Zoom patches Mac app to remove local server, allow uninstalls following backlash

Zoom macOS app
Image: Zoom

Websites could access your Mac’s camera without permission before the fix



Read More:

11 July 2019 | 0

Apple has issued a silent update to macOS that removes the Zoom Mac app’s localhost server.

Zoom has released a patch for its Mac app that removes a localhost Web server from your Mac and allows users to manually uninstall the app from the menubar after a serious flaw was discovered.

 In a Medium post earlier this week, security researcher Jonathan Leitschuh disclosed a vulnerability in the app that could allow a website to access your Mac’s camera without your knowledge or permission. As Leitschuh explained, the vulnerability stemmed from Zoom’s quest for simplicity.

As the service works, you can just send anyone a Zoom meeting link which will in turn automatically open the Zoom client installed on their machine.

In case you’ve deleted the app, Zoom keeps a localhost Web server running silently on your Mac, Leitschuh said, so the Zoom client will reinstall when a link is clicked without requiring any user interaction on your behalf besides visiting a webpage.

However, Zoom explains that changes implemented by Apple in Safari 12 that “requires a user to confirm that they want to start the Zoom client prior to joining every meeting” disrupted that functionality. So in order to save users an extra click, Zoom installed the localhost web server as “a legitimate solution to a poor user experience problem”.

While the company claims that it has no evidence of a Mac being subjected to a DOS attack, which it describes as a “empirically a low risk vulnerability,” it also announced it will be implementing a public vulnerability disclosure program within the next several weeks.

But even beyond the practice of surreptitiously running a localhost Web server on hundreds of thousands of Macs around the world, Leitschuh unearthed a vulnerability that “allows any website to forcibly join a user to a Zoom call, with their video camera activated, without the user’s permission… and would have allowed any webpage to DOS (Denial of Service) a Mac by repeatedly joining a user to an invalid call.”

Leitschuh says Zoom dragged its feet on disclosing the vulnerability after being contacted in March, having only implemented a “quick fix” in late June.

However, after he published the Medium post Monday, the company responded with a workaround rather than a true fix: “In light of this concern, we decided to give our users even more control of their video settings. As part of our upcoming July 2019 release, Zoom will apply and save the user’s video preference from their first Zoom meeting to all future Zoom meetings.

“Users and system administrators can still configure their client video settings to turn OFF video when joining a meeting. This change will apply to all client platforms.”

However, all that changed when the story began getting traction among Mac enthusiast sites. Late Tuesday, the company released a patch that both removed the localhost web server and allowed users a way to permanently delete the Zoom app after calling the issue an “honest oversight”.

IDG News Service

Read More:

Comments are closed.

Back to Top ↑