A zero-day exploit appears in OS X 10.10 Yosemite that would allow malware to be installed without the need for passwords

malware-zero-day-os x 10.10-0

This exploit discovered by Malwarebytes, one of the most reputable companies in the field of malware research, states in a statement that discovered a malware installer which would take advantage of the new error logging features introduced in the latest version of OS X.

Specifically, you would get root-level permissions by modifying the sudoers configuration file of the Mac in question, leaving it unprotected and open to install adware like VSearch, variations of Genieo, and MacKeeper.

malware-zero-day-os x 10.10-1

We leave the literal statements of Malwarebytes below:

As you can see from the code snippet shown here, the script explodes the DYLD_PRINT_TO_FILE vulnerability which writes to the file and then executes it. Part of the modification is removed when it has finished writing to the file.

The fundamental part of this modification lies in the sudoers file. The script makes a change that allows shell commands to be run as root using sudo, without the usual requirement to enter a password.

The script then uses sudo's new passwordless behavior to launch the VSInstaller application, found in a hidden directory on the installer disk image, giving it superuser permissions and thus the ability to install anything anywhere. place. (This application is responsible for the installation of the VSearch adware.)

Ars Technica first reported on this bug discovered by researcher Stefan Esser last week, saying that developers were unable to use standard OS X security protocols with dyld. Esser said the vulnerability is present in Apple's current version of OS X 10.10.4 and in recent beta versions of OS X 10.10.5, not already in OS X 10.11.


Buy a domain
You are interested in:
The secrets to launching your website successfully

Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.