Security bypass vulnerability in sudo in Apple OS X by setting the system clock and sudo user timestamp to the epochID: oval:org.secpod.oval:def:26696 | Date: (C)2015-09-11 (M)2023-12-07 |
Class: VULNERABILITY | Family: macos |
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a security bypass vulnerability. A flaw is present in the application, which fails to handle a system clock and sudo user timestamp with epoch. Successful exploitation allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.
Platform: |
Apple Mac OS X 10.10 |
Apple Mac OS X Server 10.10 |