{"id":119431,"date":"2021-02-03T20:58:45","date_gmt":"2021-02-03T20:58:45","guid":{"rendered":"https:\/\/www.techweekmag.com\/?p=119431"},"modified":"2021-03-05T14:32:19","modified_gmt":"2021-03-05T14:32:19","slug":"macos-big-sur-is-in-danger-new-vulnerability-allows-full-access-to-the-system","status":"publish","type":"post","link":"https:\/\/www.stereoindex.com\/tech\/technology\/macos-big-sur-is-in-danger-new-vulnerability-allows-full-access-to-the-system\/","title":{"rendered":"macOS Big Sur is in danger: New vulnerability allows full access to the system"},"content":{"rendered":"<p>A security vulnerability that was classified as CVE-2021-3156 last week affects sudo, a system administration program that allows users to execute commands with security privileges as another user, such as an administrator.\u00a0The bug causes a buffer overflow in sudo, as a result of which the current user&#8217;s ROOT access rights are changed.\u00a0This allows an attacker to gain access to the entire system, but first he needs low-level access to exploit the vulnerability, which can be obtained, for example, using malware.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">CVE-2021-3156 also impacts <a href=\"https:\/\/twitter.com\/Apple?ref_src=twsrc%5Etfw\">@apple<\/a> MacOS Big Sur (unpatched at present), you can enable exploitation of the issue by symlinking sudo to sudoedit and then triggering the heap overflow to escalate one&#8217;s privileges to 1337 uid=0. Fun for <a href=\"https:\/\/twitter.com\/p0sixninja?ref_src=twsrc%5Etfw\">@p0sixninja<\/a> <a href=\"https:\/\/t.co\/tyXFB3odxE\">pic.twitter.com\/tyXFB3odxE<\/a><\/p>\n<p>\u2014 Hacker Fantastic &#x1f4e1; (@hackerfantastic) <a href=\"https:\/\/twitter.com\/hackerfantastic\/status\/1356645638151303169?ref_src=twsrc%5Etfw\">February 2, 2021<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><br \/>\nsudo is part of many UNIX systems, including macOS.\u00a0The vulnerability was initially proven to affect Ubuntu, Debian and Fedora, and there were doubts about Mac devices.\u00a0Now security researcher Matthew Hickey has said that the latest version of macOS could also be vulnerable to this attack.<\/p>\n<p>Last week, experts suggested that the macOS Big Sur 11.2 update should fix the vulnerability, but it was discovered that this release of sudo remained unchanged.\u00a0Thus, it can be argued that the bug also affected macOS.\u00a0Matthew Hickey determined that, with some minor changes, the bug could still be used to give attackers access to macOS root user accounts.\u00a0This has already been confirmed by Carnegie Mellon University CERT Will Dormann and macOS Security Lead Patrick Wardle.<\/p>\n<p>Apple has already notified the CVE-2021-3156 vulnerability, so a patch will be released soon.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A security vulnerability that was classified as CVE-2021-3156 last week affects sudo, a system administration program that allows users to execute commands with security privileges as another user, such as an administrator.\u00a0The bug causes a buffer overflow in sudo, as a result of which the current user&#8217;s ROOT access rights are changed.\u00a0This allows an attacker [&hellip;] <a class=\"g1-link g1-link-more\" href=\"https:\/\/www.stereoindex.com\/tech\/technology\/macos-big-sur-is-in-danger-new-vulnerability-allows-full-access-to-the-system\/\">More<\/a><\/p>\n","protected":false},"author":10404,"featured_media":119432,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[805],"tags":[779],"class_list":{"0":"post-119431","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology","8":"tag-news"},"acf":[],"aioseo_notices":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.stereoindex.com\/tech\/wp-json\/wp\/v2\/posts\/119431","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stereoindex.com\/tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stereoindex.com\/tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stereoindex.com\/tech\/wp-json\/wp\/v2\/users\/10404"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stereoindex.com\/tech\/wp-json\/wp\/v2\/comments?post=119431"}],"version-history":[{"count":0,"href":"https:\/\/www.stereoindex.com\/tech\/wp-json\/wp\/v2\/posts\/119431\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stereoindex.com\/tech\/wp-json\/wp\/v2\/media\/119432"}],"wp:attachment":[{"href":"https:\/\/www.stereoindex.com\/tech\/wp-json\/wp\/v2\/media?parent=119431"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stereoindex.com\/tech\/wp-json\/wp\/v2\/categories?post=119431"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stereoindex.com\/tech\/wp-json\/wp\/v2\/tags?post=119431"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}