+ Reply to Thread
Results 1 to 1 of 1

Thread: Mac-hacks

  1. Link to Post #1
    France On Sabbatical
    Join Date
    7th March 2011
    Location
    Brittany
    Posts
    16,763
    Thanks
    60,315
    Thanked 95,900 times in 15,481 posts

    Default Mac-hacks

    From Jim Stone:

    BEYOND HACKABLE: OSX 10.13 "High Sierra" hackable just by typing "root"

    This proves Mac OS is just a linux distro (something the tech savvy have known for years). This flaw is possible to circumvent by setting a root password, but the fact that it was out in the open, never mentioned and easily executed for two and a half months is inexcusable. It had to have been done on purpose.

    From Wired magazine:
    There are hackable security flaws in software. And then there are those that don't even require hacking at all—just a knock on the door, and asking to be let in. Apple's macOS High Sierra has the second kind.

    On Tuesday, security researchers disclosed a bug that allows anyone a blindingly easy method of breaking that operating system's security protections. Anyone who hits a prompt in High Sierra asking for a username and password before logging into a machine with multiple users, they can simply type "root" as a username, leave the password field blank, click "unlock" twice, and immediately gain full access.

    In other words, the bug allows any rogue user that gets the slightest foothold on a target computer to gain the deepest level of access to a computer, known as "root" privileges. Malware designed to exploit the trick could also fully install itself deep within the computer, no password required.

    "We always see malware trying to escalate privileges and get root access," says Patrick Wardle, a security researcher with Synack. "This is best, easiest way ever to get root, and Apple has handed it to them on a silver platter."

    As word of the security vulnerability rippled across Twitter and other social media, a few security researchers found they couldn't replicate the issue, but others captured and posted video demonstrations of the attack, like Wardle's GIF below, and another that shows security researcher Amit Serper logging into logged-out account. WIRED also independently confirmed the bug.

    The fact that the attack could be used on a logged-out account raises the possibility that someone with physical access could exploit it just as easily as malware, points out Thomas Reed, an Apple-focused security researcher with MalwareBytes. They could, for instance, use the attack to gain root access to a logged-out machine, set a root password, and then regain access to a machine at any time. "Oooh, boy, this is a doozy," says Reed. "So, if someone did this to a Mac sitting on a desk in an office, they could come back later and do whatever they wanted."

    Reed also notes, however—and other researchers confirm—that it's possible to block the attack simply by setting a password for the root user.. If you've installed High Sierra and haven't set a root password, you should do it now. In a statement, Apple confirmed the problem, reiterated that short-term fix, and promised a longer-term software patch: "“We are working on a software update to address this issue," an Apple spokesperson wrote.1

    [...]

    1Corrected 11/28/2017 11:30pm EST to note that the short term fix for High Sierra's security flaw is to set a root password, not to either set that password or disable root access, as this article had originally stated.
    "La réalité est un rêve que l'on fait atterrir" San Antonio AKA F. Dard

    Troll-hood motto: Never, ever, however, whatsoever, to anyone, a point concede.

  2. The Following 22 Users Say Thank You to Hervé For This Post:

    3(C)+me (29th November 2017), Bill Ryan (30th November 2017), BMJ (29th November 2017), Bob (29th November 2017), ceetee9 (29th November 2017), christian (30th November 2017), Daughter of Time (30th November 2017), Debra (29th November 2017), Did You See Them (29th November 2017), drneglector (29th November 2017), fourty-two (29th November 2017), Foxie Loxie (29th November 2017), Ioneo (30th November 2017), jjjones (30th November 2017), mab777 (29th November 2017), Michelle Marie (29th November 2017), Nasu (29th November 2017), Noelle (29th November 2017), Omni (29th November 2017), Sunny (30th November 2017), uzn (29th November 2017), Wind (29th November 2017)

+ Reply to Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts