vendor:
Mac OS X
by:
Emil Kvarnhammar, joev, wvu
N/A
CVSS
N/A
Privilege Escalation
264
CWE
Product Name: Mac OS X
Affected Version From: Mac OS X 10.9
Affected Version To: Mac OS X 10.10.2
Patch Exists: YES
Related CWE: CVE-2015-1130
CPE: o:apple:mac_os_x
Other Scripts:
https://www.infosecmatter.com/metasploit-module-library/?mm=exploit/osx/local/rootpipe, https://www.infosecmatter.com/nessus-plugin-library/?id=84488, https://www.infosecmatter.com/nessus-plugin-library/?id=84489, https://www.infosecmatter.com/nessus-plugin-library/?id=118525, https://www.infosecmatter.com/nessus-plugin-library/?id=124990, https://www.infosecmatter.com/nessus-plugin-library/?id=110645, https://www.infosecmatter.com/nessus-plugin-library/?id=118990, https://www.infosecmatter.com/nessus-plugin-library/?id=111144, https://www.infosecmatter.com/nessus-plugin-library/?id=119187, https://www.infosecmatter.com/nessus-plugin-library/?id=110701
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: OSX
2015
Mac OS X “Rootpipe” Privilege Escalation
This module exploits a hidden backdoor API in Apple's Admin framework on Mac OS X to escalate privileges to root. Dubbed "Rootpipe." Tested on Yosemite 10.10.2 and should work on previous versions. The patch for this issue was not backported to older releases. Note: you must run this exploit as an admin user to escalate to root.
Mitigation:
Patch the system with the latest security updates.