Jump to content

Dylib Hijack Scanner

Recommended Posts

The "Dylib Hijack Scanner" flags Malwarebytes version 3 as a "vulnerable application", pointing to the use of the Alamofire used. Is this a reason for concern?

It says:

rpath vulnerability: /Library/Application Support/Malwarebytes/MBAM/Engine.bundle/Contents/PlugIns/FrontendAgent.app/Contents/Frameworks/Alamofire.framework/Versions/A/Alamofire

rpath vulnerability: /Library/Application Support/Malwarebytes/MBAM/Engine.bundle/Contents/PlugIns/SettingsDaemon.app/Contents/Frameworks/Alamofire.framework/Versions/A/Alamofire

rpath vulnerability: /Library/Application Support/Malwarebytes/MBAM/Engine.bundle/Contents/PlugIns/RTProtectionDaemon.app/Contents/Frameworks/Alamofire.framework/Versions/A/Alamofire


Dylib Hijack Scanner is available here: https://objective-see.com/products.html

Link to post
Share on other sites

  • Staff

Thanks for bringing that to our attention. We'll look into that and see what we can do to mitigate this.

Note that there are many apps that are also vulnerable, including some of Apple's own apps, like Aperture, iPhoto, iMove and Xcode. Apple has put some measures in place in recent versions of macOS that significantly reduce the threat posed by these vulnerabilities, though it's still worth closing vulnerabilities wherever possible.

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.