Categories: SecurityWorkspace

Mac Hit By Second Zero-Day Flaw In As Many Months

Apple’s Mac OS X has been hit by another unpatched ‘vertical privilege escalation’ security bug similar to the DYLD_PRINT_TO_FILE bug made public in July, and exploited by adware discovered earlier this month.

The latest bug was published by a developer describing himself on Twitter as an 18-year-old Italian named Luca Todesco, who released proof-of-concept code allowing an unprivileged user to gain root access to a system.

The bug affects every version of Mac OS X 10.10 Yosemite, including the most recent release, but is mitigated with the upcoming OS X 10.11 El Capitan release, according to researchers. Todesco said he notified Apple of the issue but acknowledged that a fix isn’t yet available for Mac OS X 10.10.

The release comes shortly after Apple’s latest update to Yosemite, which patches the DYLD_PRINT_TO_FILE flaw.

That bug was published by researcher Stefan Esser, who initially criticised Apple for failing to provide a patch for current versions of Mac OS X, only fixing it in Yosemite, now in public testing.

Like Esser, Todesco was criticised by some security experts for releasing the proof-of-concept before a patch was available.

However, Todesco said he hadn’t intended the release as a broadside against Apple, and said on Twitter that the reaction against him was “out of proportion” to the importance of the flaw, which he compared to the jailbreak exploits used to gain control of iPhones.

Such exploits can be used by an application with low-level privileges to gain control of a system with top-level root access.

Malicious software

In the case of Todesco’s tpwn exploit, an attack would require physical access to a system, but it could also be exploited if a user were tricked into installing malicious software. Todesco’s proof-of-concept exploits two issues via IOKitLib, an interface for accessing physical devices attached to a system.

Todesco recommended users install Esser’s SUIDGuard to protect against unpatched privilege-escalation flaws. In general, security experts say users can mitigate such risks by only installing applications from trusted sources.

Security researcher Emil Kvarnhammar of Sweden’s Truesec publicised a privilege-escalation bug called rootpipe in Mac OS X Yosemite last year, but withheld details of the flaw until a patch was available.

Apple didn’t immediately respond to a request for comment. The company typically doesn’t comment on security-related issues.

Are you a security pro? Try our quiz!

Matthew Broersma

Matt Broersma is a long standing tech freelance, who has worked for Ziff-Davis, ZDnet and other leading publications

Recent Posts

Craig Wright Sentenced For Contempt Of Court

Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…

2 days ago

El Salvador To Sell Or Discontinue Bitcoin Wallet, After IMF Deal

Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…

2 days ago

UK’s ICO Labels Google ‘Irresponsible’ For Tracking Change

Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…

2 days ago

EU Publishes iOS Interoperability Plans

European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…

3 days ago

Momeni Convicted In Bob Lee Murder

San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…

3 days ago