[ad_1]
A recently discovered root exploit vulnerability in Linux has also been found to affect macOS from Apple Inc.
The vulnerability allows an attacker to trigger a so-called stack overflow in Sudo, a program for Unix-like computer operating systems. Allows users to execute security privileges of another user to gain access to other accounts in the operating system that they should not otherwise have access to.
Researchers at Qualysis Inc. first identified the vulnerability on January 26 and said they had found it in Ubuntu 20.04 (Sudo 1.8.31), Debian 10 (Sudo 1.8.27) and Fedora 33 (Sudo 1.9.2), but they also pointed out that it can affect other operating systems. Matthew Hickey, co-founder of Hacker House, has since discovered that the vulnerability affects macOS Big Sur as well, as demonstrated Tuesday. On twitter how he was able to exploit it.
“To activate it, you just have to overwrite argv[0] or create a symbolic link, thus exposing the operating system to the same local root vulnerability that has plagued Linux users for the last week, ”Hickey told ZDNet today.
MacOS has its roots in Unix and includes support for Sudo, so it is also vulnerable. However, exactly how many versions of macOS are vulnerable is unknown. Sudo’s own vulnerability is believed to have existed for at least 10 years before being discovered. That means that potentially macOS versions dating back to OS X 10.7 Lion released in 2011 or even earlier versions can also be exposed to the vulnerability.
Apple has so far not commented on the report. Linux distributors are in the process of patching the vulnerability, and Apple is likely to do the same.
“By itself, a privilege escalation vulnerability might not be especially dangerous for most users,” Jonathan Knudsen, technical evangelist at electronic design automation company Synopsys Inc., told SiliconANGLE. “It could only be exploited if an attacker you already have access to your computer, either locally or through a remote shell. “
However, if he’s chained to one or more feats, that risk could multiply, he added. “If an attacker exploits another vulnerability to run code as a normal user, then he can trivially run the exploit for CVE-2021-3156 to gain administrative access, allowing him to take full control of your computer,” he said.
MacOS users should apply Apple updates as soon as a fix for the vulnerability is available, he advised. “In the meantime, try to avoid risky situations,” he said. “Keep your other software up-to-date, don’t click on untrustworthy links, don’t click on email attachments unless you are sure of their origin, disable network services you are not using, etc.”
Image: Apple
Since you’re here …
Show your support for our mission with our one-click subscription to our YouTube channel (below). The more subscribers we have, the more YouTube will suggest relevant business and emerging technology content to you. Thank you!
Support our mission: >>>>>> SUBSCRIBE NOW >>>>>> to our YouTube channel.
… We would also like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.’s business model is based on the intrinsic value of content, not advertising. Unlike many online publications, we do not have a pay wall or run banner ads, because we want to keep our journalism open, without influence or need to chase traffic.SiliconANGLE journalism, reporting and commentary, along with unscripted live video from our Silicon Valley studio and globe-trotting video crews at the cube – requires a lot of work, time and money. Keeping quality high requires the support of sponsors who are aligned with our vision of ad-free journalistic content.
If you like reports, video interviews and other ad-free content here, please take a moment to see a sample of the video content endorsed by our sponsors, tweet your supportand keeps coming back to SiliconeANGLE.
[ad_2]