Home
Ahhhh Bugs!!! Mac OS

Ahhhh Bugs!!! Mac OS

May 09 2021

Ahhhh Bugs!!! Mac OS

  1. Apple's Fast User Switching — introduced in 2003's OS X Panther, and a convenient security feature — is reportedly causing problems with some M1 Macs. The feature lets users have more than one.
  2. I think it is inaccurate to call this a bug as it is certainly not a bug as it was designed specifically to behave this way. And probably because no one in their right mind expected that,achieves running Mac OS 8 would still be being used more than 20 years later, especially when Mac OS 9 was already in development.
  1. Ahhhh Bugs Mac Os X
  2. Mac Os Mojave
  3. Ahhhh Bugs Mac Os Catalina

A bug in the latest version of Apple's OS X gives attackers the ability to obtain unfettered root user privileges, a feat that makes it easier to surreptitiously infect Macs with rootkits and other types of persistent malware.

The history of macOS, Apple's current Mac operating system originally named Mac OS X until 2012 and then OS X until 2016, began with the company's project to replace its 'classic' Mac OS.That system, up to and including its final release Mac OS 9, was a direct descendant of the operating system Apple had used in its Macintosh computers since their introduction in 1984. Previous bugs believed to have been fixed in 10.12.3. An obscure bug in Safari which surfaced during battery endurance tests has been fixed. This resulted in shortened endurance if the Safari Develop menu was enabled, and caching turned off there. It is most unlikely to affect ordinary users, it seems. Mac OS 8.5.1, released December 7, 1998, was a minor update to Mac OS 8.5 that fixes several bugs that caused crashes and data corruption. Mac OS 8.6 edit Released May 10, 1999, Mac OS 8.6 added support to the Mac OS nanokernel to handle preemptive tasks via the Multiprocessing Services 2.x and later developer API.

The privilege-escalation bug, which was reported in a blog post published Tuesday by security researcher Stefan Esser, is the type of security hole attackers regularly exploit to bypass security protections built into modern operating systems and applications. Hacking Team, the Italian malware-as-a-service provider that catered to governments around the world, recently exploited similar elevation-of-privileges bugs in Microsoft Windows. When combined with a zero-day exploit targeting Adobe's Flash media player, Hacking Team was able to pierce security protections built into Google Chrome, widely regarded as the Internet's most secure browser by default.Ahhhh Bugs!!! Mac OS

According to Esser, the OS X privilege-escalation flaw stems from new error-logging features that Apple added to OS X 10.10. Developers didn't use standard safeguards involving additions to the OS X dynamic linker dyld, a failure that allows attackers to open or create files with root privileges that can reside anywhere in the OS X file system.

Advertisement

Ahhhh Bugs Mac Os X

Ahhhh

'This is obviously a problem, because it allows the creation or opening (for writing) of any file in the filesystem,' Esser wrote. 'And because the log file is never closed by dyld and the file is not opened with the close on exec flag the opened file descriptor is inherited by child processes of SUID binaries. This can be easily exploited for privilege escalation.'

Mac Os Mojave

Esser said the vulnerability is present in both the current 10.10.4 (Yosemite) version of OS X and the current beta version of 10.10.5. Importantly, the current beta version of 10.11 is free of the flaw, an indication that Apple developers may already be aware of the vulnerability. It wouldn't be surprising for the fix to find its way into an incremental update to OS X released in the coming weeks. An Apple spokesman said that engineers are aware of Esser's post.

The proof-of-concept attack Esser included with his post is known as a local exploit. The typical scenario where these types of vulnerabilities are exploited is by developers of malicious applications who want to elevate privileges without prompting end users to enter a system password or by developers of remote exploits that on their own can execute malicious code as a regular user but not as root.

Ahhhh Bugs Mac Os Catalina

'Local exploits are considered less dangerous than remote exploits,' well-known OS X security researcher Pedro Vilaca told Ars. 'Still, they can be extremely useful in many scenarios. Local exploits in OS X are by the dozen. It seems everyone has a few.'

Ahhhh Bugs!!! Mac OS

Leave a Reply

Cancel reply