This is a SUID, SIP, and binary entitlements universal OS X local privilege escalation exploit.
49924fa08f8b101fdbdbfba6d5e985f619bd430e2fafdbe9548a078782bb9339
The code responsible for loading a suid-binary following a call to the execve syscall invalidates the task port after first swapping the new vm_map into the old task object leaving a short race window where we can manipulate the memory of the euid(0) process before the old task port is destroyed.
6be58b3f0fc092cb166e20a9e2e0ef99de307b957f1541a6ea0dd7a8f7ca8531
Apple Security Advisory 2016-03-21-1 - iOS 9.3 is now available and addresses code execution, memory corruption, and various other vulnerabilities.
d014002b8661b674441b269148e4a0b977e33ca0eab871429b9557c64d61cff3