Lucene search

K
zdtBrandon Azad1337DAY-ID-29937
HistoryMar 03, 2018 - 12:00 a.m.

Apple OS X 10.10.5 - rootsh Local Privilege Escalation Exploit

2018-03-0300:00:00
Brandon Azad
0day.today
21

0.002 Low

EPSS

Percentile

62.5%

Exploit for macOS platform in category local exploits

## rootsh
 
rootsh is a local privilege escalation targeting OS X Yosemite 10.10.5 build
14F27. It exploits [CVE-2016-1758] and [CVE-2016-1828], two vulnerabilities in
XNU that were patched in OS X El Capitan [10.11.4] and [10.11.5]. rootsh will
not work on platforms with SMAP enabled.
 
[CVE-2016-1758]: https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2016-1758
[CVE-2016-1828]: https://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2016-1828
[10.11.4]: https://support.apple.com/en-us/HT206167
[10.11.5]: https://support.apple.com/en-us/HT206567
 
### CVE-2016-1758
 
CVE-2016-1758 is an information leak caused by copying out uninitialized bytes
of kernel stack to user space. By comparing leaked kernel pointers with fixed
reference addresses it is possible to recover the kernel slide.
 
### CVE-2016-1828
 
CVE-2016-1828 is a use-after-free during object deserialization. By passing a
crafted binary-serialized dictionary into the kernel, it is possible to trigger
a virtual method invocation on an object with a controlled vtable pointer.
 
### License
 
The rootsh code is released into the public domain. As a courtesy I ask that if
you use any of this code in another project you attribute it to me.
 
 
Download: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/44239.zip

#  0day.today [2018-03-17]  #

0.002 Low

EPSS

Percentile

62.5%