It seems that little by little the popularity of OS X is taking its toll in terms of security research and it is that when an operating system begins to be more of "common use" all eyes turn to him. This is the case with the latest version of OS X available to users who, although we recently knew that they had solved a major security flaw, now we see another vulnerability that affects system permissions comes to light.
If you remember, the previous one vulnerability called DLYD_PRINT_TO_FILE it managed to run malware on the computer thanks to a script that it wrote in this file, modifying the behavior of sudoers so that it did not request an administrator password for the installation of said malware. Now this new exploit achieves something similar, let's see what it does.
The exploit was discovered by Italian developer Luca Todesco and it is based on a combination of attacks - including a reference to a null pointer in OS X IOKit - to drop a payload test in the root shell. It affects all OS X versions of Yosemite, but it seems that at least for the moment it doesn't work on OS X El Capitan.
Todesco announced the ruling this Sunday so hopefully Apple will soon release a patch to fix this security hole. Many computer security researchers they have criticized such reckless action to make these types of bugs known to the general public on the grounds that companies should have time to issue security patches to fix bugs that may harm consumers.
On the other hand, it is also true that sometimes they are allowed too much time and they take a long time to resolve the error. Specifically Apple has a past with too many ups and downs in OS X security updates, however it has shown improvement in recent months, the company has patched the dyld vulnerability in less than a month after I saw the light.