TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Swedish hacker finds 'serious' vulnerability in OS X Yosemite

97 pointsby drewjajaover 10 years ago

8 comments

roemeover 10 years ago
If I could, I would kick the guys responsible¹ for the disclosure in the ass. Why? We now have a youtube video with shitty music (proving essentially nothing), some scaremonger articles with a lot of prose around very few interesting bits, and most importantly, a friggin&#x27; hashtag. And of course, a name for the vuln.<p>But nothing, absolutely nothing, on how to protect myself as an ordinary user. The only thing I was able to infer from the craptastic video is that the user they&#x27;re escalating from is member of the &quot;admin&quot; group, i.e. not a &quot;Standard User&quot; but an &quot;Admin&quot; in OS X lingo.<p>Among other things, the most obvious difference to regular Accounts is that &quot;Admin&quot; users can use sudo by default, but no clue whatsoever is exploited here. Some pipe-fu with sudo? Or a stupid setting by apple allowing &quot;admin&quot; group members doing dangerous things without (re-)authentication?<p>In closing, best make sure you&#x27;re using OS X as a &quot;Standard&quot; User, not &quot;Admin&quot;. In my experience, it&#x27;s quite painless.<p>Edit: &gt; <i>&quot;Normally there are &#x27;sudo&#x27; password requirements, which work as a barrier, so the admin can&#x27;t gain root access without entering the correct password. However, rootpipe circumvents this,&quot; he says.</i><p>This at least hints at the possibility that said exploit does not work from a standard user. So there&#x27;s that...<p>¹most likely not the researchers themselves, but some &quot;CEO&quot; or other suit-level.
评论 #8552257 未加载
评论 #8550558 未加载
canadevover 10 years ago
After this past year with all of its vulnerabilities, I feel so uncomfortable when I really consider it. I make online payments at least a few times a week using my credit card. I log into my web based email multiple times per day.<p>I feel so naked.<p>Has anyone who uses brew and other dev stuff tried running Mac OS as a user account? Does it work out well?
评论 #8549376 未加载
评论 #8550684 未加载
评论 #8550113 未加载
评论 #8549989 未加载
评论 #8549662 未加载
评论 #8549321 未加载
geeteeover 10 years ago
If I&#x27;m reading this correctly, I find it surprising that Apple does not have a bug bounty program.
gojomoover 10 years ago
I suspect he shouldn&#x27;t have even said this much, before the agreed-upon full-disclosure date.
评论 #8549957 未加载
dguidoover 10 years ago
Welcome to the club? PrivEscs exploits are becoming more common as sandboxes increase in popularity. Windows had a few such bugs exploited by real attackers as zerodays in the last month (check CrowdStrike and FireEye blogs). I don&#x27;t think this is news. It is simply a matter of effort whether an attacker will escalate privileges to root or kernel, it depends on the value of the data they are after.
评论 #8549747 未加载
vinhboyover 10 years ago
Interesting. So does anyone actually run their OS X from a non-admin user? Are there any permission problems that arises?
评论 #8549449 未加载
评论 #8550927 未加载
评论 #8550895 未加载
评论 #8549373 未加载
hellbannerover 10 years ago
So if you&#x27;re an admin you can do admin-y things..
评论 #8549134 未加载
cratermoonover 10 years ago
Does it have a clever name a cool logo yet? If not, then it&#x27;s not a real vulnerability.