Apple's Mac OS X operating system may allow local privilege escalation in family of "at" commands.
Mac OS X includes the "at" family of commands in order to schedule tasks. However, a flaw in these commands results in the commands not dropping privileges correctly. This may allow a malicious local user to run commands with additional privileges, read or remove protected files, or gain other unintended access.
The affected commands include: at, atq, atrm, atrun, and batch.
These commands are disabled by default in Mac OS X. If they have been enabled, a malicious local user may gain additional privileges including the ability to remove or read protected files, or run programs with additional privileges.
Apply a patch
Thanks to Apple Product Security for reporting this vulnerability. Apple in turn thanks Kevin Finisterre of Immunity, Inc. for reporting this vulnerability.
This document was written by Ken MacInnis.
|Date First Published:||2005-01-27|
|Date Last Updated:||2005-01-28 15:55 UTC|