Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
And yes, I maintain that there isn’t some army of evildoers out there trying to get into your computer by blindly banking into it.

Ok, so... you are not being targeted, but I can say without a shadow of a doubt that someone has already tried to get into your home network today. Anything that is reachable over the Internet is attacked way more often than we'd like to believe, but they are not targeting you. It's all done at random. Most of the attacks are very basic and easily turned away. The attackers are basically running down the street trying every doorknob.
 
nothing. This is not priority, as there is low chance of exploitation by someone who has no physical access to your device.


It needs to be patched, but it is not “red alert”.


It is not bug that concerns me, it is how Apple treats issues. They can be quiet for months.
Doesn't Microsoft say something like that and everyone gives them grief? Would you be happy if Apple was the new Microsoft?
 
Yeah, this almost isn't exploitable, if I understand the bug correctly:
  • User mounts a filesystem backed by a dmg file.
  • Attacker with write permission on the dmg file modifies it.
  • Attacker uses a huge amount of RAM so that the in-memory copies of the data from the DMG get pushed out.
  • Kernel reads in modified DMG from disk when asked to read blocks from disk.
And in particular, the only definitive impact is when:
  • User runs app that sends Mach messages to another app using out-of-band data backed by a file on a DMG.
  • Attacker with write permission on the dmg file modifies the DMG.
  • Attacker uses a huge amount of RAM so that the in-memory copies of the data from the DMG get pushed out.
  • Kernel reads in modified DMG from disk when asked to provide the contents of that Mach message.
The only realistic exploits I can think of are things like:
  • Tricking the kernel into reloading a code page from an app running from a DMG after modifying it (very hard to exploit) while the app is running (to get around Gatekeeper)
  • Modifying or intercepting Mach messages in flight by mounting a DMG over top of /var/tmp (requires root) or some other location where apps are likely to store this sort of data.
And if you can do the latter, you can probably just use a modified kernel to do the same thing.

I'm really curious why this is considered high severity. At a glance, I would have called it a nuisance-level security bug.




This is actually about modifying things that are temporarily stored on a DMG by modifying the underlying volume. If this were about modifying a DMG to avoid integrity checks, an attacker could just disable the checksum or substitute another volume with a valid checksum. Those checksums are to prevent corruption, not modification. Code signatures, on the other hand....
Creating an exploit with runaway memory use sounds easy enough, but isnt the OS going to dump pages from all other open apps before it dumps them from the targeted active app? And wouldnt the whole thing grind to a halt in short order?
 
Ok, so... you are not being targeted, but I can say without a shadow of a doubt that someone has already tried to get into your home network today. Anything that is reachable over the Internet is attacked way more often than we'd like to believe, but they are not targeting you. It's all done at random. Most of the attacks are very basic and easily turned away. The attackers are basically running down the street trying every doorknob.

Agreed. Two years ago I checked the auth.log on my home server, and every day there were thousands of illicit attempts to log in via SSH. They were not sophisticated at all, just using the standard port, and "root" as login name - which was already blocked from SSH per default, so even if they happened to guess the password right they would not get in. Still, I guess every once in a while they find a machine with insufficient security, and it costs them virtually nothing to keep trying, everywhere, 24/7.
(I felt uneasy about the sheer amount of attempts, so I changed my SSH port, that made it all go away.)
 
Still, I guess every once in a while they find a machine with insufficient security, and it costs them virtually nothing to keep trying, everywhere, 24/7.

The funny thing is that sometimes they manage to get in, but the tools they used to crack their way in are so broad that they don't always know what they just got into. I had one of my websites broken into once and didn't discover that someone had broken in for several days. I didn't know because there were no obvious signs of a break-in. I had made very heavy customizations that interfered with everything they tried to do. They came back several times, fumbled around and gave up.
 
Last edited:
  • Like
Reactions: Grey Area
Any bets on if Apple fixes this within 90 days?

It's in the article. Apple hasn't fixed it yet which is unfortunate, 90 days should have been enough.

According to Google, Apple has not yet fixed this issue. Apple is planning to implement a fix in an upcoming software update, however.
 
All software has bugs. And will continue to as users demand more from our operating systems.

I'm betting they didn't, seeing as how Google has now shared this information publicly.


You'd also hope it would be fixed "quicker" because its now publicly known.
 
  • Like
Reactions: smirking
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.