Daily Archives: August 11, 2015

[GadgeTell] What you should know about the OS X flaw


The latest version of OS X includes a new bug that is being exploited by hackers. The bug enables hackers to install malware on a Mac, even without a password.

The cause for this bug is due to a new feature in OS X that logs errors, which was recently discovered to be highly exploitable by hackers. With the error log vulnerability, hackers are able to create files with root privileges anywhere on OS X.

Anti-malware firm Malwarebytes elaborated on the malicious installer’s threat: “The sudoers file is a hidden Unix file that determines, among other things, who is allowed to get root permissions in a Unix shell, and how. The modification made to the sudoers file, in this case, allowed the app to gain root permissions via a Unix shell without needing a password.”

As the bug is on the current, fully patched 10.10.4 version of OS X, there are many users who could be negatively impacted. However, the bug is not in a beta release of 10.11, which suggests that Apple was aware of the problem and were working to fix it.

Malwarebytes’ Adam Thomas was able to bring the bug to the public’s attention after discovering the adware installer, which caught his attention especially after he noticed that his subdoers file had been modified.

How the Malware Operates

Dubbed DYLD_PRINT_TO_FILE due to its exploitation of the infected command, the malware’s potential to issue commands and control the passwords needed to issue those commands makes vulnerable Macs an access point for adware, which hackers can easily implement with the bug. The flaw has already been patched in both the OS X 10.11 El Capitan beta and in the OS X 10.10.5 beta, the former of which is not out until this fall.

The infecting command will look something like this in a user’s subdoers file:

echo ‘echo “$(whoami) ALL=(ALL) NOPASSWD:ALL” >&3′ | DYLD_PRINT_TO_FILE=/etc/sudoers newgrp; sudo -s

Apple’s Response

Now that the issue is a major talking point in the tech community, Apple didn’t waste any time in revoking the malware’s certificate.

This means that Gatekeeper, Apple’s service that blocks untrusted programs, will prevent it from launching. Gatekeeper is similar to a digital security system of sorts. Apple is also updating OS X’s anti-malware definitions, so the malware will be rejected in the future upon external installation attempts.

Gatekeeper’s ability to revoke the certificates is important in bugs like these and many others, since it makes using a Mac much safer while Apple works to address the bug entirely with a patch. In the future, with the release of OS X El Capitan, System Integrity Protection represents the next wave of certificate protection by even more effectively limiting harm. In addition, Apple encourages customers to use the Mac Apple Store as a source for apps, since every app on the store is pre-checked for any viruses or vulnerabilities.

Do You Need to Worry?

If you’re running OS X 10.10.4, DYLD_PRINT_TO_FILE is still a concern, though not as much as you may think.

Apple removed much of the threat by revoking the malware’s certificate, though a full patch will still be needed to remedy it entirely. Patches for malware are very complex to build and take time, but it’s expected to be available shortly.

Although users shouldn’t be terribly worried about this bug, since it is has been properly identified, this OS X flaw should at least raise users’ attention about being cautious when downloading software via suspicious websites or email.

The next iteration of DYLD_PRINT_TO_FILE may unfortunately be only one install away, so always exercise caution when downloading software.

Image by Barn Images

Continue at source:

[GadgeTell] What you should know about the OS X flaw

Detailed vs. Narrative Essay Writing

Why the Doctrine was advisable composition This composition is definitely an initial function by EVDebs. It doesn’t necessarily reflect the views expressed in RationalWiki Statement. but we welcome dialogue of the wide range of suggestions. Unless otherwise explained, that is authentic material, released under CC-BY- SA 3.0 or any version. See RationalWiki:Copyrights. Feel liberated to make responses about the talk page. That may likely be far more appealing, and might reflect a wider array of RationalWiki publishers’ ideas.

WWE RAW Results: August 10, 2015


Payback Out of Nowhere.

Thirteen nights before SummerSlam, the 1159th edition of WWE Monday Night RAW came to you, live, from the Xfinity Arena at Everett in Everett, WA. As announced earlier today on WWE.com, RAW will feature a special edition of Miz TV as self-proclaimed “A-Lister” The Miz will welcome fellow Tough Enough judge and former Intercontinental Champion Daniel Bryan as his guest! What does the former World Champion have in store for Miz TV? Will Daniel Bryan weigh in on the Triple Threat Match for the Intercontinental Championship at SummerSlam that will feature The Miz, as well as Big Show and Intercontinental Champion Ryback? Does the Tough Enough judge have an update on his condition?

Match Results

  • 6-Diva Tag: Team Bella def. Team B.A.D. by Brie Bella rolling up Tamina.
  • Big E & Kofi Kingston (with Xavier Woods) def. Los Matadores (with El Torito) by Big E pinning Diego following the Midnight Hour.
  • #1 Contender’s Triple Threat Match: Randy Orton def. Cesaro & Kevin Owens by pinning Cesaro following the RKO to earn a shot at the WWE World Heavyweight Title later in the night.
  • Luke Harper (with Bray Wyatt) def. Dean Ambrose (with Roman Reigns) by pin following the Discus Clothesline.
  • Rusev (with Summer Rae) & Mark Henry (with Lana) fight to a No Contest after Summer Rae attacks Lana.
  • Neville def. King Barrett by pin following the Red Arrow.
  • WWE World Heavyweight Championship: Randy Orton def. Seth Rollins (c) by DQ after Sheamus interferes. As a result, Seth Rollins (c) retains.

See page 2 for detailed results.

Continue reading:

WWE RAW Results: August 10, 2015