请输入您要查询的百科知识:

 

词条 Rootpipe
释义

  1. References

Rootpipe is a security vulnerability found in some versions of OS X that allows privilege escalation whereby a user with administrative rights, or a program executed by an administrative user, can obtain superuser (root) access. This is considered problematic as the first user account created under OS X is furnished with administrator rights by default.[1] By leveraging other security vulnerabilities on a system, such as an unpatched web browser, rootpipe could be used by an attacker to help gain complete control of the operating system.[1]

Emil Kvarnhammar of TrueSec, a security firm credited with the discovery, says that he found the vulnerability after several days of binary analysis. He recommends creating an account without administrative privileges to be used for normal everyday work, and using FileVault.[1]

An older exploit for the same issue was later published on exploit-db[2] suggesting the issue dates back to June 2010. It appears the exploit was used by the author during a presentation on Trusteer Rapport at 44con 2011 [3].

The vulnerability was reported to Apple Inc. in October 2014,[4] and has been reported as present in OS X versions 10.7.5, 10.8.2, 10.9.5 and 10.10.2.[5] OS X 10.10.3 was officially designated as patched by Apple, but Kvarnhammar (crediting Patrick Wardle) has blogged that the vulnerability is still present in that version.[6][7] On 1 July 2015, Kvarnhammer noted that additional restrictions had been introduced in OS X 10.10.4, adding in a comment two days later that he believed the then-current versions of OS X 10.9 (with Security Update 2015-005) and 10.10 to be safe from the exploit.[8]

In November 2017, a similar vulnerability was revealed which allowed logging in as root with no password.[9]

References

1. ^{{cite web|url=http://winfuture.de/news,84365.html|title=Achtung vor Rootpipe: Super-User-Rechte ohne Passwort am Mac|author=Nadine Juliana Dressler|publisher=}}
2. ^{{cite web|url=https://www.exploit-db.com/exploits/36739/|title=Apple Mac OSX < 10.9/10 - Privilege Escalation|date=13 April 2015|work=exploit-db}}
3. ^{{cite web|url=https://www.youtube.com/watch?v=EimZQgt7WPg|title=Trusteer Rapport, Neil Kettle - 44CON 2011|date=23 October 2011|work=youtube}}
4. ^{{cite web|url=http://www.macworld.com/article/2841965/swedish-hacker-finds-serious-vulnerability-in-os-x-yosemite.html|title=Swedish hacker finds 'serious' vulnerability in OS X Yosemite|date=31 October 2014|work=Macworld}}
5. ^{{cite journal |author= Fabian Scherschel (fab@ct.de) |title=Root-Lücke in OS X |journal=c't |location= |publisher=Heise |date=2015-04-18 |volume=2015 |issue=10 |pages=49}}
6. ^{{cite web|url=https://truesecdev.wordpress.com/2015/04/21/os-x-10-10-3-still-vulnerable/|title=OS X 10.10.3 still vulnerable|publisher=}}
7. ^{{cite web|url=http://www.digitaltrends.com/computing/former-nsa-staffer-finds-new-way-to-abuse-rootpipe-vulnerability-in-os-x/|title=Rootpipe continues: Former NSA staffer finds Mac vulnerability - Digital Trends|author=Krystle Vermes|date=21 April 2015|work=Digital Trends}}
8. ^{{cite web|url=https://truesecdev.wordpress.com/2015/07/01/exploiting-rootpipe-again/|title=Exploiting rootpipe again|publisher=}}
9. ^{{cite web|url=https://www.bbc.com/news/technology-42161823|title=Apple rushes to fix major password bug|publisher=BBC}}
{{Hacking in the 2010s}}

1 : Privilege escalation exploits

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/11/11 8:15:57