After a successfull exploit on ESET’s antivirus scanner NOD32 and Kaspersky’s engine now googles security expert taviso has found a new critical bug in avast! antivirus scanner with which a system call could be done.
Now everybody wonders who will be the next, Trend Micro, Intel (formerly known as McAfee) or somebody else ?
Oh no, only a couple of days after OS X a privilege escalation vulnerability in OS X 10.10 was discovered a researcher at Malwarebytes spot a new adware installer that uses DYLD_PRINT_TO_FILE exploit.
What you can do?
- wait until Apple released a security update while you get p0wned
- install SUIDGuard – A kernel extension adding mitigations to protect SUID/SGID binaries
Kovah, who discovered with his partners a lot of firmware vulnerabilities in Macs last year has now designed with Trammell Hudson, a security engineer a worm they dubbed Thunderstrike 2 that can spread between MacBooks undetected.
[The attack is] really hard to detect, it’s really hard to get rid of, and it’s really hard to protect against something that’s running inside the firmware
Full disclosure at BlackHat 2015!
The cause of the problem appears to be a memory error in the processing of MPEG4 and 3GPP video files.
Security expert Stefan Esser discovered a privilege escalation vulnerability in OS X 10.10. The vulnerability is found in the dynamic linker dyld.
echo 'echo "$(whoami) ALL=(ALL) NOPASSWD:ALL" >&3' | DYLD_PRINT_TO_FILE=/etc/sudoers newgrp; sudo -s
OS X 10.11 pre release candidate is not vulnerable. For all the people who want to fix the problem as soon as possible a patch was published by Esser.
…a very interesting article published in wired magazine about wireless carjacking.