![]() ![]() Check out the attached screenshot to see how the sudoers file was modified by the adware installer. Hackers can take advantage of this zero-day vulnerability, which is actually related to some error logging features introduced in Mac OS X 10.10.4, to install adware like MacKeeper, VSearch, and Genieo. Thomas reports that he discovered the zero-day security vulnerability in Mac OS X 10.10.4 Yosemite during some tests of a new adware installer that had modified his sudoers file, so anyone can install anything on the target Mac without needing the user's consent or any other system password. The 0-day vulnerability affects the current stable version of Mac OS X 10.10 (build 10.10.4), as well as the recent Beta build of OS X 10.10.5 Yosemite, and was discovered by Adam Thomas while testing a new adware installer. ![]() ![]() Malwarebytes announced the big news on August 3, 2015, which is called a DYLD_PRINT_TO_FILE exploit. It would appear that researchers have just discovered a serious zero-day vulnerability in Apple's OS X 10.10 (Yosemite) computer operating system that could allow attackers and skilled hackers to install malware and adware into a target Mac without the need for administrative privileges. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |