Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: ~Kim4VRWC's~; 1234; Abundy; Action-America; acoulterfan; AFreeBird; Airwinger; Aliska; altair; ...
Google releases what is referred as a ZERO day vulnerability for OS X. In fact THREE of them. . . but they are nothing serious to worry about. All of them require physical access to the Mac and access to the Terminal with suitable passwords. — PING!


Apple Security Ping!

If you want on or off the Mac Ping List, Freepmail me.

2 posted on 01/24/2015 1:45:12 AM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
[ Post Reply | Private Reply | To 1 | View Replies ]


To: All
Latest OS X 10.10.2 beta kills Google-disclosed vulnerabilities dead

By Rene Ritchie, iMore.com, Thursday, Jan 22, 2015 a 9:54 pm EST

Google's Project Zero research program has disclosed and released proof-of-concept code for a series of 0day — previously unknown — vulnerabilities found in Apple's OS X operating system for the Mac. These exploits are all fixed in OS X Yosemite 10.10.2, now in beta. Here's a report on the vulnerabilities from Ars Technica:

In the past two days, Project Zero has disclosed OS X vulnerabilities here, here, and here. At first glance, none of them appear to be highly critical, since all three appear to require the attacker to already have some access to a targeted machine. What's more, the first vulnerability, the one involving the "networkd 'effective_audit_token' XPC," may already have been mitigated in OS X Yosemite, but if so the Google advisory doesn't make this explicit and Apple doesn't publicly discuss security matters with reporters.

These vulnerabilities were reported to Apple in October of 2014 and made public as part of Google Zero Day's 90 day disclosure policy. (You can argue the merit of that policy in the comments below.)

None of these exploits can be used remotely, which means they'd need to be combined with remote exploits or with physical access to the hardware to be put to any practical use.

The first vulnerability, 130, which could result in privilege escalation, contains the following comment:

See https://code.google.com/p/google-security-research/issues/detail?id=121 for a discussion of mitigations applied in Yosemite.

It includes the following:

Apple added some hardening to libxpc in Yosemite - xpc_data_get_bytes now has the following check: [list of checks]

That vulnerability, 121, is marked as fixed and closed as of January 8.

Status: Fixed

Closed: Jan 8

This could indicate the 130 vulnerability is also no longer an issue for people running Yosemite.

What's more, based on the latest build of OS X 10.10.2, seeded yesterday to developers, Apple has already fixed all of the vulnerabilities listed above. That means the fixes will be available to everyone running Yosemite as soon as 10.10.2 goes into general availability.


3 posted on 01/24/2015 1:52:21 AM PST by Swordmaker (This tag line is a Microsoft insult free zone... but if the insults to Mac users contnue...)
[ Post Reply | Private Reply | To 2 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson