Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
That was quick

Not necessarily a good thing when it come to security patches! :)

You certainly want to get the fix out - especially when it's been released to the public and so many people are aware of the vulnerability - but it's more important to get the fix right. I wonder how many bugs and/or vulnerabilities are the result of rushed patches to other bugs/vulnerabilities.
 
How embarrassing...

I wish Apple did a better job testing their releases. We used to enjoy such high quality when it came to software updates and releases.

Did you read about the bug? Its not some kind of easy thing to discover and would easily be passed over by pretty much all testing attempts.

This is why not only did it take until now to discover, but also why companies pay bounties for hackers to find these kinds of things.
 
Amazing that this bug existed in the first place, however equally amazing response from Apple in terms of how quickly they released a fix.

As embarassed as I am for Apple for this bug popping up, I’m quite certain that Windows would not have benefited from such a quick correction.
It’s a good thing this isn’t happening on windows then.
 
This is actually an argument in favor of public disclosure of vulnerabilities. Lemi Orhan Ergin was catching a lot of criticism yesterday for posting it on twitter, but if this bug had been reported privately, it would have taken much longer to fix, while malicious actors would be able to exploit it all along.

While both sides have merit, it's unrealistic to think some bugs could be fixed as quickly as this one was, which is why there is criticism of the "zero day reporting" method.
 
Why would that have anything to do with Samsung TVs?

He means the TV advertisements. They jab at perceived weaknesses or flaws in Apple products. The current one getting heavy airplay shows a guy opening and using various iPhones over the years, then after he buys a Galaxy towards the end, he passes another guy waiting in line for the iPhone X who has his hair cut like the notch in the top of the iPhone X display. It's actually pretty funny - you see the picture of the phone in the background and it looks just like the guy's forehead.
 
Wow....that is surprising. Most user will never login as root on their MAC.
But why would it have ever been set to blank?

It wasnt set to blank. There was an error in validating the password, and then it set your password to nothing.
 
N.b. this wasn't just about root. You could log in as any of the faceless user accounts. Someone should try these others too, if you've enabled the Guest user account. I'll bet if they're disabling the root account entirely, they didn't fix the whole bug.

macos 10.13 bug isn't limited to root in all circumstances; via ARD, you can log in as any existing user (e.g. _applepay) and share the screen of the logged-in user. also _uucp is allowed to log in

https://twitter.com/unsynchronized/status/935656609140711426
 
Last edited:
This is actually an argument in favor of public disclosure of vulnerabilities. Lemi Orhan Ergin was catching a lot of criticism yesterday for posting it on twitter, but if this bug had been reported privately, it would have taken much longer to fix, while malicious actors would be able to exploit it all along.
True, sometimes it's necessary to go public so they'd have no choice but to patch it immediately. But I would still give Apple a couple weeks on something like this, unless there is any sort of evidence that it's already being exploited maliciously.
 
This would have been a very different story on Android. The majority of Android devices are still vulnerable to KRACK let alone any other issue that will never get fixed (except on Nexus devices).
Android is a mobile operating system and you are also forgetting the fact that Google supports it's own devices for at least as long as Apple does.
Google fixes all of it's security issues, but most hardware producers don't fix their Android software as soon as the phone is off the market.
 
Let's face it. Every operating system or application will come across vulnerabilities, but it doesn't truly matter how bad or embarrassing they are (like this one was).

The real test of a quality company is how fast they can provide the update/patch to fix the security issues.

This was a big miss on the "QA front end" for Apple, but it was an excellent timely response to an urgent issue.
 
Does Craig loose some stock options for this and other software bugs that seem to become more prevalent with Apple software?

It boggles the mind that everyone seems to forget that Jonny Ive was put in charge of software after they canned Forestall on trumped up nonsense, only recently was Ive finally replaced by Craig.

All the garbage software Apple has released for the past 5 years is Ive's fault, he doesn't know software and he's no manager by a long shot.
 
I'm officially done upgrading all Apple software until they're a few bug releases past the launch. Between all the bug in iOS 11, and now High Sierra, if I updated immediately I'd lose my ability to work in my day-to-day programs like the Adobe Creative Suite. They have dropped the ball on QA testing if random users can find these bugs and cracks so quickly.
 
This is actually an argument in favor of public disclosure of vulnerabilities. Lemi Orhan Ergin was catching a lot of criticism yesterday for posting it on twitter, but if this bug had been reported privately, it would have taken much longer to fix, while malicious actors would be able to exploit it all along.
I respectfully disagree. Lemi could have very easily given Apple 24 hours notice to fix or go public. By not doing so, they left a lot of computers vulnerable.
 
I'm not terribly surprised the fix came so fast. 1: It needed to. OS X has always touted itself as being secure, and whatever bugs have been there in previous releases they aren't usually ones that compromise the system like this. 2: How was this bug in there in the first place? Probably something SUPER SIMPLE to fix, a single line of code that was in there for testing or something that they just forgot to take out. It makes it an even more colossal blunder that it was pushed out like that.
 
Given how easy to exploit this bug is, it sure needed to be...

Until now, I didn't even know MacOS has a restartless mechanism for quick security updates. Clearly Apple anticipated a fix like this being necessary in advance ;)

If you perform software updates via the command line in Terminal, you don't even need to restart for macOS point updates (though they say that you should). Everything seamlessly updates while you are working with no disruption to the user.
 
You ever heard of Windows? Perhaps you should read up on that OS if you haven't.

Also, give me a break. Nobody finds everything, not even "Apple". Patched quickly and painlessly. Move along.

Three... count 'em... THREE... critical and ridiculous security issues with Mac OS High Sierra within as many months. This one, the Disk utility one, and the keychain one. And that's just the security issues...

There's no excuse for it. Saying "well, microsoft is just as bad" just means that Apple is stooping to Microsoft's level... but I'd actually venture to say that Apple is starting to get worse than Microsoft when it comes to Mac OS vs Windows.
 
Would this have been a fixable issue for the semi-savvi to just open a console window and type "sudo passwd root"... and then setting a password that isn't blank?
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.