Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: antiRepublicrat
Every multi-user OS I know has had privilege elevation exploits. They are a common danger. Normally when running a server, all of the service accounts do not have logon privileges (meaning a hacker exploiting a service can't use it to log on), only the local admin accounts do. That restricts the abilities of someone who hacked a service. The hacker is left with trying to exploit the flaws in that service to perform a privilege elevation, which is harder than if they could just log on.

Nonetheless, it is very telling that somebody could exploit a local attack on OS X so easily. What that tells me is that OS X users are far too complacent about their own security. Most hacks with banks, financial companies, etc come from the inside. If average users can gain access to root-level resources so easily under OS X, there's clearly trouble brewing for Apple. And, given the recent proliferation of proof-of-concept attacks on OS X, I think you're going to see a *lot* more exploits being produced by (cr)(h)ackers. This isn't a one-off thing. It's going to get a lot worse for Apple before it gets better.
82 posted on 03/07/2006 8:49:32 AM PST by DemosCrash
[ Post Reply | Private Reply | To 76 | View Replies ]


To: DemosCrash
Nonetheless, it is very telling that somebody could exploit a local attack on OS X so easily.

Well, it's easy if you've previously found an exploit, never notified the vendor, and use it when you get the chance.

84 posted on 03/07/2006 8:51:57 AM PST by antiRepublicrat
[ Post Reply | Private Reply | To 82 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson