MacOS bug bounty

MacOS bug bounty

255 bookmarks
Custom sorting
Popping iOS =14.7 with IOMFB
Popping iOS =14.7 with IOMFB
During the last two weeks of my summer (as of writing, summer 2021), I decided to try and take a crack at iOS 14 kernel exploitation with the IOMobileFramebuffer OOB pointer read (CVE-2021-30807). Unfortunately, a couple days after I moved back into school, I found out that the way I was doing exploitation would not work on A12+ devices. An exploit that only works on hardware from 2017 and before is lame, so I scrapped it and started over.
·jsherman212.github.io·
Popping iOS =14.7 with IOMFB
CVE-2020-3854
CVE-2020-3854
A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15.3. An application may be able to execute arbitrary code with system privileges.
·github.com·
CVE-2020-3854
doorLock
doorLock
A persistent denial of service vulnerability affecting iOS 15.2 - iOS 14.7 (and likely through 14.0), triggered via HomeKit
·trevorspiniolas.com·
doorLock
CVE-2021-1758 macOS/iOS CoreText Out-Of-Bounds Read
CVE-2021-1758 macOS/iOS CoreText Out-Of-Bounds Read
Description of the vulnerability This vulnerability exists in libFontParser.dylib, a part of CoreText library is widely used in macOS, iOS, iPadOS to parse, and draw text. This vulnerability allows attacker to read memory of application which uses API from CoreText. Technical Details The Vulnerability macOS/iOS creates a font format structure that is a wrapper of Type 1 Postscript Font and TrueType Font is Mac Resource Fork Font. CoreText is a framework to draw text that supports load Mac Resource Fork Font through API CoreText CTFontManagerCreateFontDescriptorsFromURL.
·starlabs.sg·
CVE-2021-1758 macOS/iOS CoreText Out-Of-Bounds Read
CVE-2021-1790 macOS/iOS CoreText libhvf Out-Of-Bounds Read
CVE-2021-1790 macOS/iOS CoreText libhvf Out-Of-Bounds Read
Description of the vulnerability This vulnerability exists in libhvf.dylib, a part of CoreText library is widely used in macOS, iOS, iPadOS to parse font. An attacker can craft an evil PDF contains the malicious font that could lead to remote code execution. Technical Details libhvf.dylib is used to parse HierVariation table in Truetype Font. libhvf.dylib is a feature of libFontParser.dylib. To enable this feature user must create a plist file in /User//Library/Preferences/com.
·starlabs.sg·
CVE-2021-1790 macOS/iOS CoreText libhvf Out-Of-Bounds Read
CVE-2021-30655 Press 5 keys and become r00t
CVE-2021-30655 Press 5 keys and become r00t
Introduction I personally love vulnerabilities with stories. This one is of that kind… About one year ago, I submitted a vulnerability to Apple that they were unable to reproduce. We exchanged some emails with the clarifications, but the security team still couldn’t have validated the original vulnerability. Then they asked me to run sysdiagnose in order to collect logs that could have helped them. The problem Like a real security researcher I checked how the /usr/bin/sysdiagnose acutally works.
·wojciechregula.blog·
CVE-2021-30655 Press 5 keys and become r00t
Forklift =3.3.9 and =3.4 Local Privilege Escalations on macOS (CVE-2020-15349/CVE-2020-27192)
Forklift =3.3.9 and =3.4 Local Privilege Escalations on macOS (CVE-2020-15349/CVE-2020-27192)
I have started to have a look at my local installed helpers on macOS. These helpers are used as an interface for applications to perform privileged operations on the system. Thus, it is quite a nice attack surface to search for Local Privilege Escalations. Forklift is an advanced dual pane file manager for macOS. It is well known under macOS power users. As part of my investigation I ide ...
·insinuator.net·
Forklift =3.3.9 and =3.4 Local Privilege Escalations on macOS (CVE-2020-15349/CVE-2020-27192)
MacOS Property List Parsing Bug(s)
MacOS Property List Parsing Bug(s)
Property lists are files that store serialized objects and are prevalant in Apple’s Operating Systems similar to how Microsoft Windows uses the Registry to store configuration data.
·oscartography.github.io·
MacOS Property List Parsing Bug(s)
CVE-2018-4262 The Apple Bug That Fell Near The WebKit Tree
CVE-2018-4262 The Apple Bug That Fell Near The WebKit Tree
Pwn2Own Vancouver is right around the corner so it seemed fitting to talk about an old Pwn2Own bug. Because we recently gave a presentation at OffensiveCon on how Adobe improperly patched some vulnerabilities, it seemed only fair to highlight how Apple has had similar issues. In April of 2018, we
·zerodayinitiative.com·
CVE-2018-4262 The Apple Bug That Fell Near The WebKit Tree
Zero Day Initiative — Diving Deep Into a Pwn2Own Winning WebKit Bug
Zero Day Initiative — Diving Deep Into a Pwn2Own Winning WebKit Bug
Pwn2Own Tokyo just completed, and it got me thinking about a WebKit bug used by the team of Fluoroacetate (Amat Cama and Richard Zhu) at this year’s Pwn2Own in Vancouver. It was a part of the chain that earned them $55,000 and was a nifty piece of work. Since the holidays are coming up, I thought
·zerodayinitiative.com·
Zero Day Initiative — Diving Deep Into a Pwn2Own Winning WebKit Bug
CVE-2020-27897: Apple macOS Kernel OOB Write Privilege Escalation Vulnerability
CVE-2020-27897: Apple macOS Kernel OOB Write Privilege Escalation Vulnerability
On Tuesday of this week, we published six advisories covering vulnerabilities in Apple macOS. One of those advisories covered a bug reported by ABC Research s.r.o. pertaining to GPUs in Apple hardware. It’s one of many macOS bugs they have submitted to the program. Now that these bugs are fixed in B
·zerodayinitiative.com·
CVE-2020-27897: Apple macOS Kernel OOB Write Privilege Escalation Vulnerability
The Story Behind CVE-2019-13013
The Story Behind CVE-2019-13013
This blog post targets fellow software developers. It’s a story of how it could happen that we shipped a version of Little Snitch with a serious vulnerability and, more importantly, what we can learn from it. It all began with a security improvement by Apple in macOS High Sierra
·blog.obdev.at·
The Story Behind CVE-2019-13013