Free Republic
Browse · Search
General/Chat
Topics · Post Article

To: Swordmaker
starts with a local root privilege exploit

Using a root privilege exploit means that the victim is running at normal priveleges. The exploit bumps the software up to the root level. The vcitim is not running at root, as you say, nobody does. But it's not impossible to find exploits to get from normal privileges to root, it just adds one more complication to the attack and one more chance for it to fail...

8 posted on 08/04/2015 3:03:41 AM PDT by palmer (Net "neutrality" = Obama turning the internet into FlixNet)
[ Post Reply | Private Reply | To 7 | View Replies ]


To: palmer
Using a root privilege exploit means that the victim is running at normal priveleges. The exploit bumps the software up to the root level.

By default, the root user account on OS X is disabled. You would first have to manually enable it and assign a password.

12 posted on 08/04/2015 4:20:22 AM PDT by Flick Lives (One should not attend even the end of the world without a good breakfast. -- Heinlein)
[ Post Reply | Private Reply | To 8 | View Replies ]

To: palmer
Using a root privilege exploit means that the victim is running at normal priveleges. The exploit bumps the software up to the root level. The vcitim is not running at root, as you say, nobody does. But it's not impossible to find exploits to get from normal privileges to root, it just adds one more complication to the attack and one more chance for it to fail...

The claim was this was a "remote" attack. . .,It is not except in the sense that it can be exported with a device in which case the new machines are toast. But if it requires being downloaded by someone with high privileges who gives it permission to install and run, that doesn't qualify it as being "remote."

24 posted on 08/04/2015 1:37:17 PM PDT by Swordmaker ( This tag line is a Microsoft insult free zone... but if the insults to Mac users continue...)
[ Post Reply | Private Reply | To 8 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson