Google Project Zero Has Revealed Details About the High Severity Bug in macOS Kernel

Tajammul Pangarkar
Tajammul Pangarkar

Updated · Mar 13, 2019

SHARE:

Scoop.market.us is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more.
close
Advertiser Disclosure

At Market.us Scoop, we strive to bring you the most accurate and up-to-date information by utilizing a variety of resources, including paid and free sources, primary research, and phone interviews. Our data is available to the public free of charge, and we encourage you to use it to inform your personal or business decisions. If you choose to republish our data on your own website, we simply ask that you provide a proper citation or link back to the respective page on Market.us Scoop. We appreciate your support and look forward to continuing to provide valuable insights for our audience.

Project Zero from Google has been quite active in diagnosing and fixing bugs for some time, and this time, a more important revelation is made. After waiting for a long period of time, the Project Zero has shared more details about a high-severity bug in macOS Kernel, affecting a huge number of devices running on the OS. It has revealed the details after providing Apple a 90-day period for patching the issue.

Talking about the bug, the official data from Project Zero says that “this means that if an attacker can mutate an on-disk file without informing the virtual management subsystem, this is a security bug.” This bug is being called ‘BuggyCow,’ and it can cause serious problems to each and every macOS user out there. Essentially, it allows an attacker to bypass several layers of protection that are built into macOS.

There may be multiple mounted file-system images in a Mac, and all these contain important information in most cases. Because of the aforesaid bug, the security of these images are at stake. An attacker will be able to make modifications to the file-system images. Of course, making use of this vulnerability would require a normal attacker to install a malware on a Mac in the first place.

Another condition is that there must be macOS apps that are storing sensitive information on hard drive — instead of going for the obvious choice of memory. If both these conditions are fulfilled, manipulation of the data would be an easy task for the attacker. The problem here is that Apple has not come forward to fix the issue yet.

According to several developers involved in Project Zero, Apple was intimated about the issue and the firm has declined to take the necessary action. Google has waited for three months before publishing the details of the bug.

SHARE:
Tajammul Pangarkar

Tajammul Pangarkar

Tajammul Pangarkar is a CMO at Prudour Pvt Ltd. Tajammul longstanding experience in the fields of mobile technology and industry research is often reflected in his insightful body of work. His interest lies in understanding tech trends, dissecting mobile applications, and raising general awareness of technical know-how. He frequently contributes to numerous industry-specific magazines and forums. When he’s not ruminating about various happenings in the tech world, he can usually be found indulging in his next favorite interest - table tennis.