Jump to content

Apple still isn't protecting OS X Yosemite users from Rootpipe


sincity

Recommended Posts

Apple still isn't protecting OS X Yosemite users from Rootpipe

Apple has failed to plug a significant security flaw in OS X Yosemite that leaves all Macs running the OS open to a vulnerability that can take over the whole machine.

First reported by Forbes, Patrick Wardle, a former NSA staffer who is now head of research at Synack, claims that he wrote code able to exploit the vulnerability despite Apple's latest version of Yosemite that was supposed to have prevented it.

The Rootpipe vulnerability allows hackers to ramp up a user's privileges to then make it more simple to take over an entire machine or alternatively spread malware across the whole system.

Wardle discovered that the extra access controls put in place by Apple in the latest update issued this month can still be bypassed and the former NSA staffer was able to connect to the vulnerable service before starting to overwrite files on his Mac.

"I was tempted to walk into the Apple store this [afternoon] and try it on the display models – but I stuck to testing it on my personal laptop (fully updated/patched) as well as my OS X 10.10.3 [virtual machine]. Both worked like a charm," Wardle jokingly added.

When do we get our fix?

The attack code, which Wardle would not reveal, has been passed on to Apple in the hope that it comes up with a fix for the bug that cannot be bypassed, however, that could take some time if its history with Rootpipe is taken into account.

Apple was first informed of the Rootpipe back door in October 2014 and, even though it planned to issue a fix in January, the update didn't actually arrive until April and as we've seen it doesn't seem to have done the job.

mf.gif


rc.img
rc.img
rc.img

a2.imga2t.img5vYq7vzTk78
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.