BLU Discuss list archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Discuss] OSX Mavericks root exploit, and Safari
- Subject: [Discuss] OSX Mavericks root exploit, and Safari
- From: richard.pieri at gmail.com (Richard Pieri)
- Date: Fri, 17 Apr 2015 14:13:41 -0400
- In-reply-to: <BY1PR0401MB164105D69C780D97CCE5F051DCE30@BY1PR0401MB1641.namprd04.prod.outlook.com>
- References: <BY1PR0401MB164105D69C780D97CCE5F051DCE30@BY1PR0401MB1641.namprd04.prod.outlook.com>
On 4/17/2015 9:26 AM, Edward Ned Harvey (blu) wrote: > I'd like to alert people that OSX Mavericks has a root exploit that > will not be fixed. All Mac users must immediately update to Yosemite > in order to maintain any semblance of security. Cutting through the hyperbole.... It's a local privilege escalation vulnerability nicknamed rootpipe. It can be mitigated by doing one thing: don't run as an administrator account. Standard user accounts cannot be used to exploit this vulnerability. -- Rich P.
- Follow-Ups:
- [Discuss] OSX Mavericks root exploit, and Safari
- From: bogstad at pobox.com (Bill Bogstad)
- [Discuss] OSX Mavericks root exploit, and Safari
- References:
- [Discuss] OSX Mavericks root exploit, and Safari
- From: blu at nedharvey.com (Edward Ned Harvey (blu))
- [Discuss] OSX Mavericks root exploit, and Safari
- Prev by Date: [Discuss] OSX Mavericks root exploit, and Safari
- Next by Date: [Discuss] OSX Mavericks root exploit, and Safari
- Previous by thread: [Discuss] OSX Mavericks root exploit, and Safari
- Next by thread: [Discuss] OSX Mavericks root exploit, and Safari
- Index(es):