[MacTUG] MacOS 10.10 security vulnerability now being exploited

Glenn Anderson anderson at uwaterloo.ca
Tue Aug 4 21:20:53 EDT 2015


The page at http://www.imore.com/dyldprinttofile-and-malware-what-you-need-know states the following regarding DYLD_PRINT_TO_FILE, which seems to imply that it isn’t all that easy for it to be installed as some articles imply. Thoughts?

"It looks like Apple has already revoked the certificate used for the junkware, so Gatekeeper—Apple's system that blocks untrusted software—will prevent it from being launched without explicit user intervention. It also looks like Apple has at least begun to update OS X's automatic anti-malware definitions to recognize and reject the junkware, so it won't be able to be installed at all."


On Aug 4, 2015, at 8:27 PM, Mike Patterson <mpatterson at uwaterloo.ca<mailto:mpatterson at uwaterloo.ca>> wrote:

https://blog.malwarebytes.org/mac/2015/08/dyld_print_to_file-exploit-found-in-the-wild/

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.uwaterloo.ca/pipermail/mactug/attachments/20150805/8b28fd9e/attachment.html>


More information about the MacTUG mailing list