https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/
Only patched in 10.10, 10.9 is left in the cold, and it does not require your user to be in the admin group to run.
Combine this with any of the remote exploits patched in the latest SA and you can have a very big and real issue at hand. Did anyone say OSX botnet?
Very nasty indeed and there is already a metasploit module available for this...
It would be nice if Apple would patch things going back several generations. But they have pointed out (
https://truesecdev.wordpress.com/2015/04/09/hidden-backdoor-api-to-root-privileges-in-apple-os-x/), "Apple indicated that this issue required a substantial amount of changes on their side, and that they will not back port the fix to 10.9.x and older."
10.10 Yosemite did introduce a slew of new features and frameworks, including some really low-level stuff (for example in the storage frameworks, in which physical I/O is entirely abstracted now, and in the communications frameworks, which are hugely different and, for example, bring Handoff, AirDrop and SMS capability to the Mac), and the Swift programming environment, and application management (such as automatic, background app updates and 2-factor per-app authentication).
Apple has another point: Any computer that runs 10.9 or 10.8 or even older can run 10.10, and the upgrade is free (unlike most Windows OS updates) and pretty painless. No app reinstallations or data recovery are needed after the update (though most applications have had their own updates to take advantage of the new ways of doing things and to fix incompatibilities), though the built-in Time Machine backup functionality makes it easy to do so when necessary. There are broad performance improvements as well as security improvements. And by now the various bugs introduced in such a massive update have been addressed. It's a fantastic and thoughtfully-designed OS; something new about it delights me every day.
The simplest and best path to ensuring a Mac is running the safest code is to upgrade, which IIRC any Mac manufactured in the past five or so years can do for free. But like many here, I'd encourage Apple to back-port security fixes, and I'd personally like to see them go very far back when feasible... though for technical reasons it sometimes won't be. My sleek, 12-year-old PowerMac tower machine still runs like a hose but hasn't seen an update in quite a while. And being based on the old PowerPC chips, it won't. But it sure is a magnificent specimen!