Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

Skip to comments.

Huge security flaw lets anyone log into a High Sierra Mac
Tech Crunch ^ | Nov 28 2017 | Kevin Coldewey

Posted on 11/28/2017 2:59:34 PM PST by grey_whiskers

Update: Apple has acknowledged the issue and is working on it. Statement and workaround below.

Wow, this is a bad one. On Macs running the latest version of High Sierra — 10.13.1 (17B48) — it appears that anyone can log in just by putting “root” in the user name field. This is a huge, huge problem. Apple will fix it probably within hours, but holy moly. Do not leave your Mac unattended until this is resolved.

The bug is most easily accessed by going to Preferences and then entering one of the panels that has a lock in the lower left-hand corner. Normally you’d click that to enter your user name and password, which are required to change important settings like those in Security & Privacy.

(Excerpt) Read more at techcrunch.com ...


TOPICS: Business/Economy; Computers/Internet; Conspiracy; Hobbies
KEYWORDS: apple; applemac; bugs; highsierra; mac; macbug; macsecurity; root; timcook; wherethehellwasqa
Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101-103 next last
To: for-q-clinton; dayglored; grey_whiskers
No because years ago I said Macs were secure by obscurity and then mocked by swordmaker and others who worshiped apple.

Now that want to act like our never happened. They can apologize and admit that we’re completely wrong and I was right. Then I’m let it go.

It was not true then and it is even less true now. You are not going to get an apology for your wrong conclusions then and your smugness claims we were wrong then. OSX/macOS has been in the wild essentially since 1998 when it was released first as a server version and there are STILL ZERO viable computer viruses for it twenty years later. . . and you are still singing the same hackneyed tune about security by obscurity you were singing way back then.

On the internet, nothing is obscure; everything is as close as next door, and as easy to find because everything is connected. In 2004, there were 12,000 PCs that were vulnerable to the Witty Worm spread all over the world, and within 3 ½ minutes 750 vulnerable PCs had been infected, and all 12,000 were infected within 45 minutes, no matter where they were in the world. THOSE computers were obscure. . . but they were easily infected by a simple virus for which the defense had ALREADY been created six months before it was created!

You've been told this all before, yet you continue to spout your canard about Macs that FAR OUTNUMBER those vulnerable PCs that were hit by the Witty Worm. . . which were all protected by third-party antivirus programs. Viruses were written for devices that had fewer than 20 vulnerable devices in the world. . . but YOU think that someone somewhere is not interested in writing malware that can't get into over 150,000,000 or more Macs that are mostly running bare naked of ANY ANTIVIRUS at all except what Apple builds into its operating system. You are delusional in your Apple user hatred because we tell you the truth which YOU can't handle.

The one single MacBot supposedly found in the wild about eight years ago, claiming to involve over 600,000 Macs which kept shrinking as more and more people reported NOT finding the Trojan JAVA script infected Macs, turned out to be a hoax perpetrated by a Russian Antivirus vendor wanting to sell a new Mac antivirus for business use. Two years later the same company claimed to have found another MacBot, this time of only 20,000 Mac, when they started to sell their consumer level anti-virus. . . but it too was a hoax.

In NEITHER case were any members of these MacBots ever found in the wild... even ones the Russian company claimed whose UUID matched as being in the bots, were found. In fact, the list of numbers in some instances belonged to Macs that had yet to be sold, and many had not yet been manufactured! The list of "Infected computers" was bogus. Two of the listed UUIDs supposedly infected Macs were in my office. . . but to be infected they had to have JAVA installed; but neither of the computers in my office had ever had JAVA installed, nor was there any sign of the "Infection."

61 posted on 11/28/2017 11:06:16 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 52 | View Replies]

To: for-q-clinton
Don’t waste your time proving it. I’ve done it years ago several times and they always makes up an excuse.

No, you have not. You just found another antiApple Troll making the claim. . . which we pointed out to you, and you refused to recognize that person as what he was, insisting he was a "fanboi" when he clearly was not, choosing to ignore the multiple citations of his calling Apple users the same names you used.

62 posted on 11/28/2017 11:08:56 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 41 | View Replies]

To: dayglored; for-q-clinton; grey_whiskers
What the...? If an application level program can turn off the operating system's built-in protection, then that built-in protection is worthless, because a Trojan-borne piece of malware can do the same thing, and all it takes is tricking the user into typing a password. We all know how easy that is.

That really is a nit, dayglored.

No, actually a TROJAN can't turn off the pre-emptive protections UNTIL AFTER you install it. Once you do that, of course it can do damage to the USER'S Partition. . . or post installation, turn off the systems protections. BUT IT FIRST HAS TO BYPASS the built-in anti-TROJAN software that will warn you THREE TIMES that the software contains a TROJAN that is DANGEROUS AND/OR DESTRUCTIVE TO YOUR SYSTEM. It will alert you on DOWNLOAD, then again on INSTALL, and then once again when you try to RUN IT THE FIRST TIME. Only after all of those things are done and APPROVED as an Administrator (Ignoring all those warning Alerts) can it ever shut off the system protections.

Installing a third party antivirus offers no such warnings, unless it's in the fine print. They do it during the startup procedure when the computer restarts after installation! These antivirus programs as a rule require installation from the ADMIN partition. . . which is another animal. . . and they install pieces of themselves in the start-up libraries. They bolt-themselves into the OS by disabling and replacing the Apple intended blockade. . . so their applications can intercept and inspect what Apple will block from ever reaching them. That is their failing philosophy.

Apple did not provide the API. That's why the 3rd party antivirus on the Mac IS bolted on. If you want to run one, don't install one that runs in the background. Get one you choose to run from time to time that does a scan on your schedule, not automatically, which looks at your HD for anything that might have slipped through. The only thing they usually find are Windows viruses and malware in the email or graphic files that won't touch a Mac.

63 posted on 11/28/2017 11:29:45 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 60 | View Replies]

To: reed13k

Just tried it on mine - 10.13.1 - and this exploit doesn’t work. Must already be rooted ;-)


64 posted on 11/29/2017 1:07:57 AM PST by glorgau
[ Post Reply | Private Reply | To 3 | View Replies]

To: Responsibility2nd

Yeah - was teaching Microsoft Server and some specific networking functions for a while - called them “Undocumented Features”.


65 posted on 11/29/2017 3:18:16 AM PST by trebb (Where in the the hell has my country gone?)
[ Post Reply | Private Reply | To 4 | View Replies]

To: dayglored

See there you go again.... Twisting facts to tell more lies.

The fact that no one was attacking them because the target was so small is obscurity. You admit that then you change the definition to suit your needs.


66 posted on 11/29/2017 3:51:00 AM PST by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 57 | View Replies]

To: for-q-clinton
You didn't read, or perhaps just didn't understand, what I wrote earlier.

Years ago, Mac security was the result of two factors: 1) a secure design based on UNIX, and 2) relative obscurity, such that it wasn't a favorite target like Windows.

In recent years, the obscurity has disappeared. Hackers target MacOS with Trojans and other attacks that are directed at the USER. Note that word, fqc... USER. Because the user is the weak link on a Mac.

The MacOS operating system security remains solid (modulo stupid errors like the one of this thread) because of its DESIGN. The dearth of successful external attacks on the system itself (without the user doing something) demonstrates this.

I'm not "twisting facts". The above ARE the facts, just as I stated them earlier.

67 posted on 11/29/2017 5:50:50 AM PST by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 66 | View Replies]

To: Swordmaker; kitkat; All
One DOES have to be in Admin to do it. . . and most people do not run in Admin mode if they are smart.
So what do you do if you’re an only user and have to be administrator? - kitkat (May, 2011)
You don't have to be the administrator even if you are the only user. Go into system preferences, select Accounts, create a new administrator user (give it an imaginary, difficult but memorable name such as "Senat0rF0gh0rnLegh0rn" [those are zeros where the 'Os' are, just don't use "Admin"!], and a hardened password that you won't forget), make that account an administrator. Turn on Fast User Switching in Login Options (that's at the bottom of the user list)... with the Name option selected. I'd turn off Automatic login. Now Log Off your account. Log into the new Administrator. Change your usual account to Standard User. Lock the Accounts Pane by clicking on the padlock in the lower left corner. Log Off the new Administrator account…

Log back into your usual account and continue your usual operations. You can still add software and install stuff, but you will have to provide the new Administrator name and password when you need to do that... a much safer way of operating. You can always switch to the Administrator for long jobs requiring administration by clicking on your name on the upper right of the menu bar and selecting the Admin account... and logging on. Always remember to log off the Admin account when not using it.

posted on 5/6/2011 by Swordmaker


68 posted on 11/29/2017 6:09:28 AM PST by conservatism_IS_compassion (Presses can be 'associated,' or presses can be independent. Demand independent presses.)
[ Post Reply | Private Reply | To 21 | View Replies]

To: PAR35

We never say Apple is perfect. We do, however, push back against baseless accusations.
Yes, this case is a bad mistake. It’s focused, it will be fixed and an update issued fast.
We’ve seen striking mistakes from Apple before. They were fixed pronto, and not mitigated into ongoing chronic ailments (like Windows suffered for decades).

What’s striking is how y’all keep coming into these threads just to wantonly badmouth others. Not sure why you enjoy slander so much.


69 posted on 11/29/2017 6:53:47 AM PST by ctdonath2 (It's not "white privilege", it's "Puritan work ethic". Behavior begets consequences.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: for-q-clinton

The operating system is configured such that nobody should ever need log in as root per se. As such, it’s easy to overlook the need to check such access from contexts that don’t apply. Looks stupid in retrospect, but as a software developer I’ve seen such mistakes many times.


70 posted on 11/29/2017 6:58:06 AM PST by ctdonath2 (It's not "white privilege", it's "Puritan work ethic". Behavior begets consequences.)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Swordmaker

bttt


71 posted on 11/29/2017 7:03:29 AM PST by Liberty Valance (Keep a Simple Manner for a Happy Life :o)
[ Post Reply | Private Reply | To 16 | View Replies]

To: grey_whiskers

“vi” is the center of “evil”.


72 posted on 11/29/2017 7:06:55 AM PST by ctdonath2 (It's not "white privilege", it's "Puritan work ethic". Behavior begets consequences.)
[ Post Reply | Private Reply | To 56 | View Replies]

To: for-q-clinton

When someone on your side eloquently tells you to shut up, maybe you should.


73 posted on 11/29/2017 7:08:51 AM PST by ctdonath2 (It's not "white privilege", it's "Puritan work ethic". Behavior begets consequences.)
[ Post Reply | Private Reply | To 67 | View Replies]

To: grey_whiskers

Podesta was helping them with security.


74 posted on 11/29/2017 7:46:52 AM PST by dila813 (Voting for Trump to Punish Trumpets!Goo)
[ Post Reply | Private Reply | To 1 | View Replies]

To: for-q-clinton
The fact that no one was attacking them because the target was so small is obscurity. You admit that then you change the definition to suit your needs.

There YOU go again telling more lies. There were lots of people attacking OSX trying to be the first to create a virus for the Mac. They failed. There were thousands of attempts. . . and thousands of failures. No one was going to leave tens of millions of bare naked computers of people with MORE MONEY than PC users un-attacked just because YOU thought they were "obscure."

These same hackers went are the people who after 12,000 PCs that were vulnerable by writing the Witty Worm virus. . . why would they NOT go after the then 60,000,000 vulnerable and target RICH environment of the Apple Macs where 99%, some 59,400,000 bare naked computers, were running without firewalls and without antivirus software? This was a time that a mere 2000 computers in a bot was worth $50,000 for just a two week window of use on the black market. . . and you think it was NOT WORTH GOING AFTER 60 million supposedly vulnerable computers that were in no way protected by antivirus programs because they were, in your word "obscure?" That is the LIE.

They did not go after the Mac because they could not crack it. It had literally had no vectors of attack.

75 posted on 11/29/2017 8:06:34 AM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 66 | View Replies]

"who after 12,000 PCs. . ." should have been "who went after 12,000 PCs. . ."
76 posted on 11/29/2017 8:11:40 AM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 75 | View Replies]

Apple has released the fix for this vulnerability on Wednesday, November 29, 2017.

http://www.freerepublic.com/focus/chat/3608949/posts?page=2


77 posted on 11/29/2017 8:51:26 AM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: All

It does not even require a system restart. . . and in fact is likely to install without interaction. I have just tested this update and it works as required. The problem is solved and is now a non-issue.


78 posted on 11/29/2017 8:56:04 AM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 77 | View Replies]

To: dayglored

Exactly security by obscurity. Thanks for playing.


79 posted on 11/29/2017 3:15:44 PM PST by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 67 | View Replies]

To: ctdonath2

I’m on the side of security. I have yet to have someone from that side say such words to me.


80 posted on 11/29/2017 3:17:22 PM PST by for-q-clinton (If at first you don't succeed keep on sucking until you do succeed)
[ Post Reply | Private Reply | To 73 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-20 ... 41-6061-8081-100101-103 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson