Now Released: New operational exploit for Mac OS X and iOS systems. You are using an Apple computer and have installed the latest update version of OS X 10.11.4? If so, you should know that Apple with this particular patch failed to protect the users of its operating system.
The news is likely to disappoint many Apple users as the latest updates to OS X El Capitan 10.11.4 and iOS 9.3 still contain a vulnerability that allows escalation of privileges and could affect 130's millions of Apple customers.
Last week, it was exposed with a critical vulnerability that allowed privilege escalation in the popular mechanism security of Apple System Integrity Protection (SIP), which affects all versions of the OS X operating system.
Soon after, Apple tried to fix the critical vulnerability with the latest patches released for Mac and iThings. But apparently the SIP security system can still be bypassed even after the critical one security update, αφήνοντας τους χρήστες της Apple ευάλωτους σε κακόβουλους χρήστες που θα μπορούσαν να αποκτήσουν πρόσβαση εξ αποστάσεως στις συσκευές τους.
The interesting thing is that the Stefan Esser, a security researcher from Germany, has released a new exploit that bypasses the latest patched version applications SIP and fits in a tweet.
Below is the exploit that can be used to modify critical OS X configuration files that even the root user is not allowed to touch.
Let's roll it out