Back to list
*Note: Email address will appear as "user domain ext" to prevent harvesting.
OSX - trojan apps can bypass authentication controls and gain root privilages
Apr 06 2005 04:06AM
bert adbas net
OSX Root Compromise
OSX can be root compromised by a trojan application. The trojan
application does not require explicit user authentication to elevate its
privileges to root, nor does the root account need to be enabled. The
Trojan application must be run from an account tha...
[ more ]
Copyright 2010, SecurityFocus