I have been away for some time.
In the first day of my return I have found the following vulnerability related with Apple.
It seems nasty… Although it cannot be remotely exploited it might be used in phishing campaigns that might trick the user to execute some software that takes ownership of the computer.
This local privilege escalation flaw resides in IOHIDFamily, an extension of the macOS kernel which has been designed for human interface devices (HID), like a touchscreen or buttons, allowing an attacker to install a root shell or execute arbitrary code on the system.
Fuck it, dropping a macOS 0day. Happy New Year, everyone. https://t.co/oG2nOlUOjk
— Siguza (@s1guza) December 31, 2017
Exploit / Proof of concept
I have learned a lot in the past months Mac OS X Server and his capabilities and what are services it can give with lower cost than competition.
The several services presented by OS Server are interesting, in the middle of the most eye candy services I have found one that allows us to improve security controls in a situation where for some time I thought there was not much to do in the native OS.
The bellow tool would allow us to mitigate brute force attacks in automated way. Something that was not known to me without extra tools.
Apple has implemented the Adaptive Firewall on Mac OS Server
Enable the service with the following command:
sudo /Applications/Server.app/Contents/ServerRoot/usr/libexec/afctl -c sudo /Applications/Server.app/Contents/ServerRoot/usr/libexec/afctl -f
afctl is a tool for temporarily blocking a given ipv4 or ipv6 address using the built-in firewall.
All blocking requests have a time to live; they are unblocked when it expires.
afctl also maintins a whitelist of addresses that it will not block.
All block requests are checked against this list before being added to the blacklist.
All the firewall rules managed by afctl are grouped into a rule set to allow for bulk enabling/disabling via -e & -d.
I did not find much documentation about this tool.
I will try to update this information while I learn.
For now what I have is the following from the man factl page:
afctl [-v debug_level] [-a ip_address -t ttl] [-w ip_address] [-r ip_address] [-x ip_address] [-c -i interval] [-e] [-d] [-f]
-v -debug_level Verbosity, ascenting numbers are more verbose. level 0 is default level 1 is basic progress.
-a -ip_address Add address to the blacklist. ip_address can be ipv4 or ipv6 in CDIR notation. No DNS names allowed. An optional -t parameter allows the specification of the time in minutes that the address will remain blocked.
-r -ip_address Remove address from the blacklist. It will also be removed from the firewall rules.
-w -ip_address Add address to the white list. ip_address can be ipv4 or ipv6 in CDIR notation. No DNS names allowed.
-x -ip_address Remove an address from the white list. ip_address can be ipv4 or ipv6 in CDIR notation. No DNS names allowed.
-c -i interval Self configure. The afctl tool will query the system configuration and determine the addresses that need to be (routers, local interfaces, nameservers). It will also modify its launchd plist to invoke the tool every interval to remove old entries from the blacklist. If -i interval is not specified, then a default value of 15 minutes will be used.
-d Disables all firewall rules managed by afctl using a rule set (see man page for ipfw ). Currently ipfw only ( ip6fw does not support rule sets).
-e Enables the rules disabled by -d (above)
-f Forces afctl into a running state (sets the proper key in af.plist and writes out af_state )
We can also get a summary of the afctl activity running the following command:
Information available from Apple is very restrict and almost resumes to this and user support questions:
I will post more as soon I have news.