	{"id":798,"date":"2009-04-17T14:13:43","date_gmt":"2009-04-17T13:13:43","guid":{"rendered":"http:\/\/blog.intego.com\/?p=798"},"modified":"2009-04-17T14:13:43","modified_gmt":"2009-04-17T13:13:43","slug":"mac-os-x-kernel-vulnerability-could-lead-to-dangerous-malware","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-kernel-vulnerability-could-lead-to-dangerous-malware\/","title":{"rendered":"Mac OS X Kernel Vulnerability Could Lead to Dangerous Malware"},"content":{"rendered":"<p><img src=\"https:\/\/www.intego.com\/mac-security-blog\/images\/disk_image.jpg\"><\/p>\n<p>Intego&#8217;s security researchers have been examining some Mac OS X exploit code that was made public last month, and have discovered that one of these exploits could lead to malware that could have serious consequences. One of the kernel exploits <a href=\"http:\/\/www.informationweek.com\/news\/hardware\/mac\/showArticle.jhtml?articleID=216401181\">mentioned here<\/a> has an interesting way of operating. <\/p>\n<p>Unlike current Trojan horses, which require that a user enter an administrator&#8217;s user name and password, this exploit could grant root access to malicious software with no password required. It takes advantage of a vulnerability that exists when volumes (hard disks, disk images, removable media or network volumes) are mounted in Mac OS X. When this occurs, root access can be obtained without needing a password. The volume itself must be &#8220;prepared&#8221; for this exploit to work, but such a malicious program can simply create a disk image when it is launched, mount the disk image, allowing the exploit to function, then unmount it.<\/p>\n<p>The danger of such an exploit is obvious: since no password is required, users get no warning. A malicious program can be disguised as a graphic file, music file or PDF, or a simple application. Note that this only seems to affect Intel-based Macs.<\/p>\n<p>Currently, there are no examples of malware exploiting this vulnerability in the wild, but Intego has updated the virus definitions for <a href=\"https:\/\/www.intego.com\/virusbarrier\/\">VirusBarrier X5<\/a> to protect against the possible use of this flaw. Apple is certainly aware of this vulnerability, and we hope they will be issuing a security update to prevent this flaw from being exploited. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Intego&#8217;s security researchers have been examining some Mac OS X exploit code that was made public last month, and have discovered that one of these exploits could lead to malware that could have serious consequences. One of the kernel exploits mentioned here has an interesting way of operating. Unlike current Trojan horses, which require that [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Intego&#039;s security researchers have been examining some Mac OS X exploit code that was made public last month, and have discovered that one of these\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-kernel-vulnerability-could-lead-to-dangerous-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mac OS X Kernel Vulnerability Could Lead to Dangerous Malware  - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Intego&#039;s security researchers have been examining some Mac OS X exploit code that was made public last month, and have discovered that one of these\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-kernel-vulnerability-could-lead-to-dangerous-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2009-04-17T13:13:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/images\/disk_image.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-kernel-vulnerability-could-lead-to-dangerous-malware\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/disk_image.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/disk_image.jpg\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-kernel-vulnerability-could-lead-to-dangerous-malware\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-kernel-vulnerability-could-lead-to-dangerous-malware\/\",\"name\":\"Mac OS X Kernel Vulnerability Could Lead to Dangerous Malware - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-kernel-vulnerability-could-lead-to-dangerous-malware\/#primaryimage\"},\"datePublished\":\"2009-04-17T13:13:43+00:00\",\"dateModified\":\"2009-04-17T13:13:43+00:00\",\"description\":\"Intego's security researchers have been examining some Mac OS X exploit code that was made public last month, and have discovered that one of these\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-kernel-vulnerability-could-lead-to-dangerous-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-kernel-vulnerability-could-lead-to-dangerous-malware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-kernel-vulnerability-could-lead-to-dangerous-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mac OS X Kernel Vulnerability Could Lead to Dangerous Malware\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-kernel-vulnerability-could-lead-to-dangerous-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-kernel-vulnerability-could-lead-to-dangerous-malware\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Mac OS X Kernel Vulnerability Could Lead to Dangerous Malware\",\"datePublished\":\"2009-04-17T13:13:43+00:00\",\"dateModified\":\"2009-04-17T13:13:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-kernel-vulnerability-could-lead-to-dangerous-malware\/#webpage\"},\"wordCount\":262,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-kernel-vulnerability-could-lead-to-dangerous-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/disk_image.jpg\",\"articleSection\":[\"Apple\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Intego's security researchers have been examining some Mac OS X exploit code that was made public last month, and have discovered that one of these","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-kernel-vulnerability-could-lead-to-dangerous-malware\/","og_locale":"en_US","og_type":"article","og_title":"Mac OS X Kernel Vulnerability Could Lead to Dangerous Malware  - The Mac Security Blog","og_description":"Intego's security researchers have been examining some Mac OS X exploit code that was made public last month, and have discovered that one of these","og_url":"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-kernel-vulnerability-could-lead-to-dangerous-malware\/","og_site_name":"The Mac Security Blog","article_published_time":"2009-04-17T13:13:43+00:00","og_image":[{"url":"https:\/\/www.intego.com\/mac-security-blog\/images\/disk_image.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-kernel-vulnerability-could-lead-to-dangerous-malware\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/images\/disk_image.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/disk_image.jpg"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-kernel-vulnerability-could-lead-to-dangerous-malware\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-kernel-vulnerability-could-lead-to-dangerous-malware\/","name":"Mac OS X Kernel Vulnerability Could Lead to Dangerous Malware - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-kernel-vulnerability-could-lead-to-dangerous-malware\/#primaryimage"},"datePublished":"2009-04-17T13:13:43+00:00","dateModified":"2009-04-17T13:13:43+00:00","description":"Intego's security researchers have been examining some Mac OS X exploit code that was made public last month, and have discovered that one of these","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-kernel-vulnerability-could-lead-to-dangerous-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-kernel-vulnerability-could-lead-to-dangerous-malware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-kernel-vulnerability-could-lead-to-dangerous-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Mac OS X Kernel Vulnerability Could Lead to Dangerous Malware"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-kernel-vulnerability-could-lead-to-dangerous-malware\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-kernel-vulnerability-could-lead-to-dangerous-malware\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Mac OS X Kernel Vulnerability Could Lead to Dangerous Malware","datePublished":"2009-04-17T13:13:43+00:00","dateModified":"2009-04-17T13:13:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-kernel-vulnerability-could-lead-to-dangerous-malware\/#webpage"},"wordCount":262,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-os-x-kernel-vulnerability-could-lead-to-dangerous-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/disk_image.jpg","articleSection":["Apple","Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-cS","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/798"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=798"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/798\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=798"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=798"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=798"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}