[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1A6603AE-B2A4-41C2-88E4-1C4070678787@justonemorething.org>
Date: Thu May 19 13:31:51 2005
From: ph0enix at justonemorething.org (ph0enix)
Subject: Mac OSX 10.4 Dashboard Authentication Hijacking
Vulnerability
> widget.system("sudo id >> /tmp/out", null);
ok, but this is not only specific to Dashboard widgets or Mac OS X
10.4. This is also possible with every other malicious application
which waits in the background until the user hits the sudo command to
elevate its privileges. Also, if you remove the password grace period
in the /etc/sudoers file, the trick will not work.
www.osvdb.org -- everything is vulnerable.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20050519/dcc7da20/attachment.html
Powered by blists - more mailing lists