Kernel Level Memory Corruption Discovered in macOS Webroot SecureAnywhere


Trustwave SpiderLabs' security research team unveiled a Webroot SecureAnywhere vulnerability which allows attackers to run malicious code in local kernel mode code.

According to the advisory, the Webroot SecureAnywhere issue can be locally exploited which means that any attacks would have to be based on executing malware on the machine or use social engineering techniques to persuade logged in users to run the exploit.

This makes it a somewhat less dangerous security flaw with a much narrower usage spectrum, seeing that without physical access to the compromised machine, attackers have to rely on far slower and time-consuming techniques as detailed above.

The kernel level memory corruption vulnerability described in Trustwave SpiderLabs' security research is caused by a user-supplied.

No comments:

Post a Comment