The latest update of OS X El Capitan 10.11.4 and iOS 9.3 still contain a privilege escalation vulnerability that could affect 130 million Apple customers. Security researcher Stefan Esser, a security researcher from Germany, has released a new exploit code to bypass latest patched version of SIP application, which just fits in a Tweet. The code can be used to modify a crucial OS X configuration file that not even root user is allowed to touch. The above exploit code successfully bypasses Apple’s SIP technology, allowing one to run processes as it is pleased.
Source: https://thehackernews.com/2016/03/sip-exploit-code.html

