I guess what I wanted to ask was what new issues and problems would home-users face as a result of this specific vulnerability?
For example would this problem make it easier for an unauthorized person to gain access to the compromised machine's files, emails, stored passwords in their browsers, etc. If so how much easier...
For users running as admins, this vulnerability would provide complete system level access without the user having to enter their username and password.
Specifically, the attacker could change the admins password to something that the attacker would know. Then the attacker would be able to authenticate the installation of more serious and concealed malware at the system level (root) of Mac OS X.
The only caveat of this method is that the user would not know the password set by the attacker and, therefore, would become aware of the attack when they would no longer be able to authenticate changes or log into their own account.
Sounds like systems using Lion could be subjected to not only have data copied from it, data could also be written to it without the user being aware.
Data that is not protected by DAC can always be read and written (copying is a read/write type operation) without the user being aware on any OS.
So if I have direct access to a Lion computer as a result of exploiting this vulnerability, technically I could authorize all kinds of malicious apps to be installed with root privs.
Only if the currently logged in user when the trojan was executed or the attacker had physical access was an admin.
This vulnerability only can be leveraged for privilege escalation in admin accounts.
This vulnerability could be very damaging if leveraged by malware under the right circumstances.
It could have been easily avoided as well given that it is due to a permissions error, which is easily fixed but also easily avoided, and not due to some vulnerability in code that is much more difficult to fix.
Here's where I'm not 100% clear about. The Lion vulnerability to my understanding can be exploited as long as a user has "local" access. Unless the article is written incorrectly, my understanding is that "local" access does not need "direct, physical" access. If that's true, then a trojan would not be the only way to compromise the system, would it not?
To achieve local access without direct physical access requires establishing a remote shell with the target computer.
Establishing a remote shell requires client-side exploitation or tricking the user to execute a trojan.
A trojan is the only relevant method to get local access to use this vulnerability from a remote location.
Client-side exploitation has already been eliminated as a possibility given that methods to do so are currently unknown for Lion given the recent improvements in runtime security mitigations with the release of Lion.
Using Linux distros with similar runtime security mitigations as Lion for a model, client-side exploitation is incredibly difficult without some pre-established local access. Of course, this is self defeating if the goal of the exploitation is to achieve that local access in the first place.
See the paper linked below about bypassing the runtime security mitigations in Linux for more details.
http://www.blackhat.com/presentatio...Europe-2009-Fritsch-Bypassing-aslr-slides.pdf
The author only manages to do so while already having local access to the OS.