Jump to content


Teenager Finds OS X 10.10.5 Zero-Day Vulnerability


style="text-align: center;">  

Thread Locked

because no one has posted on it for the last 3199 days.

If you need to add something to this thread then

 

Please click the "Report " link

 

at the bottom of one of the posts.

 

If you want to post a new story then

Please

Start your own new thread

That way you will attract more attention to your story and get more visitors and more help 

 

Thanks

Recommended Posts

Oh dear.

 

 

Only days after Apple released OS X 10.10.5, fixing a host of security flaws, a further serious (and as yet unpatched) vulnerability has been made public, by an Italian teenager who says he researches security holes in his spare time.

 

 

Luca Todesco has released details of a zero-day vulnerability in OS X 10.9.5 and OS X 10.10.5, the latest shipping version of Apple's desktop and laptop operating system.

 

 

According to MacIssues, the problem identified by Todesco lies in how OS X handles NULL pointers in programs, opening an opportunity for malicious code to bypass the operating system's defences.

 

 

Fortunately, the attack does depend upon unsuspecting users downloading and agreeing to execute malicious code on their computer — although, as we all know, malicious hackers are experts at using social engineering and compelling lures to trick the unwary into making unwise decisions.

 

 

Some have already criticised 18-year-old Todesco for making available proof-of-concept code that exploits the unpatched OS X vulnerability, but on Twitter he appears to be unrepentant:

Follow

9hvDma8l_normal.png
Luca Todesco @qwertyoruiop

 

"considering filing a lawsuit against Todesco for his gross negligence in releasing the how-to for this exploit" - guns don't kill people

12:12 AM - 17 Aug 2015

 

 

 

 

Once again, I'm inclined to believe that Apple might get more assistance from independent vulnerability researchers if it were to offer a financial reward for the responsible disclosure of bugs, rather than take its current — somewhat aloof — approach.

 

It remains to be seen whether Apple will release a patch for this latest vulnerabilities, or attempt to wait until OS X 10.11 El Capitan ships (the beta version reportedly already thwarts this particular attack).

Personally, my hope is that they will do the right thing and protect users of their current official shipping version rather than leave them in the lurch until they are ready to upgrade.

 

Meanwhile, the Thunderstrike 2 vulnerability continues to remain unpatched by Apple.

One hopes that the fix for that — like Todesco's zero-day vulnerability — will be coming sooner rather than later.

 

Apple, please get the bugs fixed. Then sort out your relationship with the vulnerability researchers.

 

 

Link

Link to post
Share on other sites

  • Recently Browsing   0 Caggers

    • No registered users viewing this page.

  • Have we helped you ...?


×
×
  • Create New...