blog.xpnsec.com/dirtynib

Preview meta tags from the blog.xpnsec.com website.

Linked Hostnames

7

Thumbnail

Search Engine Appearance

Google

https://blog.xpnsec.com/dirtynib

MacOS "DirtyNIB" Vulnerability

While looking for avenues of injecting code into platform binaries back in macOS Monterey, I was able to identify a vulnerability which allowed the hijacking of Apple application entitlements. Recently I decided to revisit this vulnerability after a long time of trying to have it patched, and was surprised to see that it still works. There are some caveats introduced with later versions of macOS which we will explore, but in this post we’ll look at a vulnerability in macOS Sonoma which has been around for a long time, and remains an 0day, urm, to this day.



Bing

MacOS "DirtyNIB" Vulnerability

https://blog.xpnsec.com/dirtynib

While looking for avenues of injecting code into platform binaries back in macOS Monterey, I was able to identify a vulnerability which allowed the hijacking of Apple application entitlements. Recently I decided to revisit this vulnerability after a long time of trying to have it patched, and was surprised to see that it still works. There are some caveats introduced with later versions of macOS which we will explore, but in this post we’ll look at a vulnerability in macOS Sonoma which has been around for a long time, and remains an 0day, urm, to this day.



DuckDuckGo

https://blog.xpnsec.com/dirtynib

MacOS "DirtyNIB" Vulnerability

While looking for avenues of injecting code into platform binaries back in macOS Monterey, I was able to identify a vulnerability which allowed the hijacking of Apple application entitlements. Recently I decided to revisit this vulnerability after a long time of trying to have it patched, and was surprised to see that it still works. There are some caveats introduced with later versions of macOS which we will explore, but in this post we’ll look at a vulnerability in macOS Sonoma which has been around for a long time, and remains an 0day, urm, to this day.

  • General Meta Tags

    8
    • title
      MacOS "DirtyNIB" Vulnerability - XPN InfoSec Blog
    • charset
      utf-8
    • X-UA-Compatible
      IE=edge
    • viewport
      width=device-width, initial-scale=1.0
    • description
      While looking for avenues of injecting code into platform binaries back in macOS Monterey, I was able to identify a vulnerability which allowed the hijacking of Apple application entitlements. Recently I decided to revisit this vulnerability after a long time of trying to have it patched, and was surprised to see that it still works. There are some caveats introduced with later versions of macOS which we will explore, but in this post we’ll look at a vulnerability in macOS Sonoma which has been around for a long time, and remains an 0day, urm, to this day.
  • Open Graph Meta Tags

    3
    • og:title
      MacOS "DirtyNIB" Vulnerability
    • og:site_name
      XPN InfoSec Blog
    • og:image
      https://assets.xpnsec.com/dirtynib/title.png
  • Twitter Meta Tags

    6
    • twitter:site
      @_xpn_
    • twitter:creator
      @_xpn_
    • twitter:card
      summary_large_image
    • twitter:title
      @_xpn_ - MacOS "DirtyNIB" Vulnerability
    • twitter:image
      https://assets.xpnsec.com/dirtynib/title.png
  • Link Tags

    7
    • alternate
      /rss.xml
    • icon
      /images/favicon.ico
    • stylesheet
      https://fonts.googleapis.com/css?family=Roboto:400,300,700|Noto+Serif:400,400italic,700,700italic
    • stylesheet
      https://fonts.googleapis.com/css?family=Open+Sans:300,400,700
    • stylesheet
      https://cdnjs.cloudflare.com/ajax/libs/prism/1.17.1/themes/prism.min.css

Emails

1
  • xpnsec[at]protonmail.com

Links

15