After exposing three critical zero-day vulnerabilities in Microsoft's Windows operating systems, Google's Project Zero vulnerability research program has revealed the existence of three more zero-day vulnerabilities, but this time, on Apple's OS X platform.





The team has published three zero-day exploits for Apple's OS X, with sufficient information for an experienced hacker to exploit the bugs in an attack. Of course, the details about the zero-days were not released without alerting Apple to these issues.





FIRST ZERO-DAY VULNERABILITY

OS X networkd 'effective_audit_token' XPC type confusion sandbox escape," allows an attacker to pass arbitrary commands to the networkd OS X system daemon because it does not check its input properly. The first flaw, "," allows an attacker to pass arbitrary commands to the networkddaemon because it does not check its input properly.





The flaw may already have been mitigated in OS X Yosemite, but there is no clear explanation of whether this is the case.

SECOND ZERO-DAY VULNERABILITY

The second and third vulnerability both are related to OS X's low-level I/OKit kernel framework.





OS X IOKit kernel code execution due to NULL pointer dereference in IntelAccelerator," gives local users who can execute code on an OS X machine root or superuser access through null pointer dereferencing, allowing privilege escalation. The flaw, "," gives local users who can execute code on an OS X machine root or superuser access through null pointer dereferencing, allowing privilege escalation.





THIRD ZERO-DAY VULNERABILITY

"OS X IOKit kernel memory corruption due to bad bzero in IOBluetoothDevice," gives an attacker the ability to write into kernel memory, potentially allowing them to crash systems or access private data. The last but not the least," gives an attacker the ability to write into kernel memory, potentially allowing them to crash systems or access private data.





All the three vulnerabilities in OS X don't appear to be highly critical as none of these exploits remotely, since all of them require physical access to the targeted computer in order to cause any real damage. However, the main concern is that the exploits could be combined with a separate exploit to elevate lower-level privileges and gain control over vulnerable Macs.





GOOGLE PROVIDED POC OF ALL THREE FLAWS

The team has also made proof-of-concept (POC) exploit code available, which provide enough technical details to write an attack code. Google privately reported the flaws to Apple on October 20, October 21, and October 23, 2014. After the expiration of the 90-day disclosure period, the company published all bugs.





GOOGLE'S PROJECT ZERO TEASED MICROSOFT

There is no surprise if Google's Project Zero has published vulnerabilities which are yet to be patched. In the past few weeks, the team has disclosed three separate security flaws in Microsoft's Windows operating system, before Microsoft planned to patch them.





Google's Project Zero is an initiative that identifies security holes in different software and calls on companies to publicly disclose and patch bugs within 90 days of discovering them. The company's tight 90-days disclosure policy encourages all software vendors to patch their products before they get exploited by the hackers and cybercriminals.



