yitit
Home
/
Computing
/
Newly discovered bug could hand control of your Mac over to hackers
Newly discovered bug could hand control of your Mac over to hackers-February 2024
Feb 12, 2026 2:38 AM

  Denys Prykhodov/ShutterstockA bug introduced in the most recent OS X update allegedly allows hackers to access unrestricted root user privileges, according to Ars Technica. This blunder on Apple’s part leaves a plethora of Mac users at risk to rootkits and other brands of persistent malware.

  The bug, originally reported on Tuesday in a blog post written by security engineer Stefan Esser, serves as the exact type of security gap hackers usually exploit to circumvent security protections. Thanks to a clear flaw in the operating system’s code, however, now they don’t have to.

  Recommended Videos

  Recently, Microsoft had to issue a fix for bugs in its Windows operating systems that similarly exploited privilege elevations. These were due to an exploit found by Hacking Team, a Milan-based “offensive technology” company employed by governments around the world to deliver malware as a service. Hacking Team was also responsible for the recent exploits that targeted Adobe Flash, whose defenses have been strengthened as a result.

  Related

  This major Apple bug could let hackers steal your photos and wipe your device

  Esser writes that the privilege-escalation bugs found in OS X derive from a new features added in OS X 10.10 designed to log system errors. Developers at Apple, however, neglected to make use of the standard safeguards needed when amending the OS X dynamic linker dyld.

  This oversight opens up the opportunity for hackers to initiate or produce files enabling root privileges. Files with such permissions can be dangerous and are able to be stored in any location within the OS X file system.

  Additionally, Esser notes that “because the log file is never closed by dyld and the file is not opened with the close on exec flag the opened file descriptor is inherited by child processes of SUID binaries. This can be easily exploited for privilege escalation.”

  Users of OS X 10.10.4 Yosemite and the beta version of the next update, 10.10.5, are at risk for the aforementioned vulnerability. The beta version of El Capitan, 10.11, on the other hand, is unburdened.

  Esser supplemented his writings with a proof-of-concept exploit code showing how malware developers could elevate privileges without asking end-users for a password. Alternatively, developers of remote exploits whose applications typically carry out malicious code as a regular user rather than as root are also an increased risk.

  Nonetheless, it wouldn’t be unusual to see Apple quietly patch this bug out in the coming weeks, as an Apple rep has already mentioned that its engineers are aware of Esser’s blog post.

Comments
Welcome to yitit comments! Please keep conversations courteous and on-topic. To fosterproductive and respectful conversations, you may see comments from our Community Managers.
Sign up to post
Sort by
Login to display more comments
Computing
Recent News
Copyright 2023-2026 - www.yitit.com All Rights Reserved