Revisiting Pegasus on iOS9

MacOS bug bounty
CVE-2022-22675: AppleAVD Overflow in AVC_RBSP::parseHRD
Information about 0-days exploited in-the-wild!
CVE-2021-1782, an iOS in-the-wild vulnerability in vouchers
Posted by Ian Beer, Google Project Zero This blog post is my analysis of a vulnerability exploited in the wild and patched in early 20...
Technical Advisory – Apple macOS XAR – Arbitrary File Write (CVE-2022-22582)
In October 2021, Apple released a fix for CVE-2021-30833. This was an arbitrary file-write vulnerability in the xar utility and was due to improper handling of path separation (forward-slash) characters when processing files contained within directory symlinks. Whilst analysing the patch for CVE-2021-30833, an additional vulnerability was identified which could allow for arbitrary file-write when unpacking a malicious XAR archive using the xar utility.
MacOS SUHelper Root Privilege Escalation Vulnerability A Deep Dive Into CVE-2022-22639
We discovered a now-patched vulnerability in macOS SUHelper, designated as CVE-2022-22639. If exploited, the vulnerability could allow malicious actors to gain root privilege escalation.
A Brief History of iMessage Exploitation
CVE-2022-22616: Simple way to bypass GateKeeper, hidden for years
In this writeup, I will introduce a very simple method to bypass GateKeeper , and uncover the root cause through reversing and debugging. Apple had already addressed it as CVE-2022-22616 in macOS Monterey 12.3, and credited the bug to two Jamf researchers (@malwarezoo, @jbradley89) and me. So, make sure you have updated your Mac devices to the latest version.
FORCEDENTRY: Sandbox Escape
Posted by Ian Beer & Samuel Groß of Google Project Zero We want to thank Citizen Lab for sharing a sample of the FORCEDENTRY exploit ...
Veni, MIDI, Vici — Conquering CVE-2022-22657 and CVE-2022-22664 — Atredis Partners
Recently, Apple pushed two security fixes for issues in the way GarageBand and Logic Pro X parsed MIDI ( musical instrument digital interface ) data. GarageBand is free and is available in the default OS X image. Logic Pro X can be purchased in the App Store: MIDI Available for: macOS Big Sur
Give Me Some (macOS) Context…
This blog post will dive into what I like to call “execution contexts” on macOS and why it is important to understand these different…
CVE-2021-30955 XNU body double copyin in mach_msg trap
Microsoft OneDrive for macOS Local Privilege Escalation | Offensive Security
Security researchers at Offensive Security discovered a vulnerability in the XPC service of Microsoft OneDrive. Here's how it works and how to secure it.
CVE-2022-22583: Bypassing macOS System Integrity Protection (SIP)
Perception Point researchers discovered a vulnerability in macOS which allows attackers to bypass Apple’s SIP (System Integrity Protection) mechanism, and thus take full control over the system.
CVE-2021-30861, CVE-2021-30975 Webcam Hacking (again) - Safari UXSS | Ryan Pickren
$100,500 Apple Bug Bounty for hacking the webcam via a Safari Universal Cross-Site Scripting (UXSS) bug. CVE-2021-30861, CVE-2021-30975
XNU kernel use-after-free in mach_msg
The Price of Compatibility: Defeating macOS Kernel Using Extended File Attributes
Apple's Envy: Root once, bypass TCC (OBTS)
CVE-2020-27937 Change home directory and bypass TCC
Introduction This is the second TCC vulnerability that has been disclosed on my & Csaba’s talk “20+ ways to bypass your macOS privacy mechanisms” during Black Hat USA. This time by changing the NFSHomeDirectory variable I was able to bypass user TCC restrictions. Do you remember the CVE-2020–9934: Bypassing the macOS Transparency, Consent, and Control (TCC) Framework for unauthorized access to sensitive user data article describing a vulnerability found by Matt Shockley?
CVE-2021-30970 New macOS vulnerability, “powerdir,” could lead to unauthorized user data access
A new macOS vulnerability, “powerdir,” could allow an attacker to bypass the operating system’s TCC technology and gain unauthorized access to a user’s protected data. We shared our findings with Apple through Coordinated Vulnerability Disclosure (CVD) and Apple released a fix.
Analysis of a Parallels Desktop Stack Clash Vulnerability and Variant Hunting using Binary Ninja
Parallels Desktop uses a paravirtual PCI device called the “Parallels ToolGate” for communication between guest and host OS. This device is identified by Vendor ID 0x1AB8 and Device ID 0x4000 in a Parallels guest.
CVE-2019-8846 Apple Safari SVG Marker Element baseVal Remote Code Execution Vulnerability
CVE-2021-30721 Apple macOS SMB server directory query arbitrary file access
CVE-2021-30722 Apple macOS SMB server create file request uninitialized memory disclosure
CVE-2021-30716 Apple macOS SMB server lock request infinite loop
CVE-2021-30717 Apple macOS SMB server directory query request integer overflow vulnerability
CVE-2021-30712 Apple macOS SMB server IOCTL request uninitialized stack variable vulnerability
CVE-2020-10005 Apple macOS SMB server TREE_CONNECT stack buffer overflow vulnerability
CVE-2021-1878 Apple macOS SMB server signature verification information disclosure vulnerability
MacOS Injection via Third-Party Frameworks - TrustedSec
TrustedSec's blog is an expert source of information on information security trends and best practices for strategic risk management.
CVE-2017-17809 Privilege Escalation Vulnerability in the VyprVPN for macOS Application
In this blog, we'll dive into the process of finding the advised vulnerability and writing a simple exploit for VyprVPN for MacOS.