4 links tagged with all of: security + vulnerabilities + macos
Click any tag below to further narrow down your results
Links
A security researcher has criticized Apple's macOS bug bounty program for significantly lowering payouts for certain vulnerabilities. Despite increasing rewards for high-profile exploits, many macOS categories now offer much smaller financial incentives, which could discourage researchers from reporting flaws.
The article discusses the vulnerabilities associated with TCC (Transparency, Consent, and Control) on macOS, which regulates app access to sensitive user data. It highlights the misconceptions among developers regarding TCC's importance in protecting user privacy and outlines various scenarios where malware could exploit TCC bypasses.
macOS, while generally secure due to built-in protections like Keychain, SIP, TCC, and Gatekeeper, remains a target for cybercriminals who exploit vulnerabilities. The article details these security mechanisms, common attack methods, and emphasizes the importance of monitoring and managing access to sensitive data to thwart potential threats.
Dillon Franke explores using Mach IPC messages as an attack vector for finding and exploiting sandbox escapes in MacOS system daemons. He details his hybrid approach of knowledge-driven fuzzing, which combines automated fuzzing with manual reverse engineering, and shares insights on identifying vulnerabilities, specifically a type confusion issue in the coreaudiod daemon. The post includes resources for building a custom fuzzing harness and tools used throughout the research.