A researcher has published a proof-of-concept (PoC) exploit for a local privilege escalation vulnerability affecting OS X Yosemite, including the latest 10.10.5 version.
The exploit was published on GitHUb over the weekend by Italian researcher Luca Todesco. The expert has refused to say why he decided to drop the zero-day without giving Apple a chance to fix the issue. “All I can say is that I had my reasons,” he told SecurityWeek.
Todesco says the vulnerability was patched by Apple in the beta version of OS X 10.11, dubbed El Capitan. This could indicate that Apple has been aware of the security hole, but the researcher noted that the company “could have simply refactored some code.”
Apple has not immediately responded to SecurityWeek’s request for comment.
The local privilege escalation attack, dubbed by the researcher “tpwn,” involves two security bugs. An attacker can leverage the technique to obtain root privileges, but only if he can execute a specially crafted file, the expert said.
NULLGuard, a tool designed by Todesco, can be used to mitigate tpwn and other attacks involving NULL pointer dereference bugs.
OS X 10.10.5 was released by Apple last week. The latest stable version of the Mac operating system attempts to patch a total of 135 vulnerabilities, including a local privilege escalation vulnerability (CVE-2015-3760) disclosed publicly in July by German researcher Stefan Esser.
This particular flaw was reported privately to Apple months ago by a researcher known as “beist.” However, the company only released a patch after experts warned that the weakness had been exploited in the wild to install adware.
Esser announced on Monday that he has updated his SUIDGuard tool to help users protect themselves against the tpwn exploit. Todesco has also recommended SUIDGuard for mitigating attacks.

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- UK Car Retailer Arnold Clark Hit by Ransomware
- EV Charging Management System Vulnerabilities Allow Disruption, Energy Theft
- Unpatched Econolite Traffic Controller Vulnerabilities Allow Remote Hacking
- Google Fi Data Breach Reportedly Led to SIM Swapping
- Microsoft’s Verified Publisher Status Abused in Email Theft Campaign
- British Retailer JD Sports Discloses Data Breach Affecting 10 Million Customers
- Meta Awards $27,000 Bounty for 2FA Bypass Vulnerability
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
Latest News
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
- F5 BIG-IP Vulnerability Can Lead to DoS, Code Execution
- Flaw in Cisco Industrial Appliances Allows Malicious Code to Persist Across Reboots
- UK Car Retailer Arnold Clark Hit by Ransomware
- Dealing With the Carcinization of Security
- HeadCrab Botnet Ensnares 1,200 Redis Servers for Cryptomining
- Cyber Insights 2023 | Supply Chain Security
- Cyber Insights 2023 | Regulations
