macOS Signature Validation Flaw Allows a Malicious Code Appeared to be Signed by Apple
In Summary : A flaw in third-party macOS APIs could allow attackers to impersonate the malicious programs to be signed by Apple. The vulne...
https://updatesinfosec.blogspot.com/2018/06/macos-signature-validation-flaw-allows.html
In Summary :
A flaw in third-party macOS APIs could allow attackers to impersonate the malicious programs to be signed by Apple. The vulnerability affects many vendors and open source projects. The vulnerability resides in how third-party vendors such as Google and Facebook checks the signed code to verify the integrity of the file. Developers use to codesign [...]
kindly refer the following link as follow up :
https://gbhackers.com/macos-signature-validation-flaw/
A flaw in third-party macOS APIs could allow attackers to impersonate the malicious programs to be signed by Apple. The vulnerability affects many vendors and open source projects. The vulnerability resides in how third-party vendors such as Google and Facebook checks the signed code to verify the integrity of the file. Developers use to codesign [...]
kindly refer the following link as follow up :
https://gbhackers.com/macos-signature-validation-flaw/