Google Project Zero Team Finds Flaws In OS X Yosemite


The Google Project Zero team is at it again, this time dismantling OS X Yosemite and finding three flaws that could lead to theft of data. The Project Zero team had already identified some flaws with Microsoft’s Windows 8.1 system just a few weeks ago. Before we go into detail it must be understood that in order for any of the three vulnerabilities to work the thief must have physical access to the target computer. So if you’re pretty good about not letting your Mac sit around where just anyone can use it, you should be pretty safe.

The first flaw in the OS X operating system is a networkd effective_audit_token XPC type confusion sandbox escape. It gets unsandboxed and runs as its own users opening the floodgates for an attack. The report suggests that it is accessible to other sandboxes from outside including ntpd, Safari WebProcess, etc… The other flaws pointed out by Project Zero’s Security team includes OS X IOKit kernel code execution, which occurs due to a NULL pointer dereference in IntelAccelerator. The third flaw pointed out by the team, includes the OS X IOKit kernel memory corruption due to bad bzero in the IOBluetoothDevice.

You can find Google’s full findings and reports at the links below. We’re sure Apple isn’t all that happy with Google Project Zero at the moment as this news gives the company a smack to the face. Hopefully Apple will take the data found and fix the vulnerabilities quickly as well as get their own teams to step up their testing and discovery processes. What do you think of Project Zero? Let us know in the comments below or on Google+, Facebook and Twitter.

  Source: The Next Digit   Source: Google   Source: Google   Source: Google

To Top