The flaw is identified as CVE-2006-4392. It affects the Mach exception ports which handle kernel errors in OS X.
A malicious user with access to a system could use the flaw to execute unauthorised code in privileged programs. This effectively provides attackers with root access, allowing them to install applications and change system settings.
Apple released a patch on Friday that repairs 15 vulnerabilities in OS X 10.4. But it fails to address the Mach vulnerability in OS X 10.3, according to the milw0rm posting.
The posting also provides code demonstrating how to exploit the vulnerability.
Because exploiting the flaw requires access to a system, it primarily concerns shared systems in schools and libraries, for instance, as well as users who provide guest accounts over the internet.
Apple had not responded to requests for comment at the time of going to press.
Cyber Resilience Summit
iTnews Executive Retreat - Security Leaders Edition
Huntress + Eftsure Virtual Event -Fighting A New Frontier of Cyber-Fraud: How Leaders Can Work Together
iTnews Cloud Covered Breakfast Summit
Live & Hands On Demo: Navigating the BMC AMI DevX Platform to Understand Code Faster Using AI



