![]() ![]() ![]() ![]() They are no longer the king, they imprison themselves in a cage based on declarative sandbox profile rules. However in modern macOS, root processes outside of sandbox are rare, most macOS built-in services run within a sandbox. The root process has superpowers, it almost can do anything, reading/writing all sensitive files/databases such as Images/Calendars. In this blog, I will analyze the details of vulnerabilities and show how to exploit them. A normal user on macOS(with SIP enabled) can locally exploit this vulnerabilities chain to elevate privilege to the ROOT without a user being aware. The only requirement needed to trigger the vulnerabilities is that Adobe Acrobat Reader DC has been installed. Today, Adobe Acrobat Reader DC for macOS patched three critical vulnerabilities(CVE-2020-9615, CVE-2020-9614, CVE-2020-9613) I reported. Yuebin Sun( of Tencent Security Xuanwu Lab 0x0 Summary ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |