Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
1. Would have been even greater if Apple had ppl who found these kind of bugs themselves before release.
2. You don't know if he found this yesterday. But sure hate on the guy who might have prevented your bank account password from ending up in the wrong hands. Jerk.

Sure but Apple is not alone in needing outsiders to find bugs like this, its an industry wide problem. All the big players have bug bounties for this kind of thing, none of them can find them all in house.
 
Last edited:
  • Like
Reactions: Irishman
You missed the bit about this NOT being a new vulnerability. Generally, it is safer to stay up to date. If you're running an OS that hasn't been patched for a year you will be exposing yourself to widely disseminated exploits.
Apple has been supporting macOS with security updates for about a year after they're replaced. Of course I update as soon as anything becomes unsupported.
[doublepost=1506437970][/doublepost]
The bottom line is, an app that you install without admin privilege just shouldn't be able to read your KeyChain data. Sure, running untrusted app is always a security risk, but there should be limits to how much damage they can do.
Even with admin privileges, can it? I don't remember. Doesn't seem like it should. Plenty of things ask for admin privileges, usually because they have to do one little thing that requires it.
 
So even if you use Safari and don't allow it to save website login and passwords, is Keychain still storing your passwords even if you say NO? I'm confused as to what Keychain does and how it works.
 
Would have been great if he contacted Apple before the OS was released. Just looking for attention. Jerk
Doesn't look like he's releasing enough details for an attacker to use the exploit.
[doublepost=1506438259][/doublepost]
What _can’t_ a non-sandboxed, unsigned application do though? If my login has the ability to see my keychain passwords (it does, and I can), shouldn’t I naturally expect any software running on my creeds has that power too?
When it's locked, it seems that nothing but your keychain password can unlock it. By default you use the "login" keychain that's locked with the login password, and it unlocks when you log in, but if you change your login password without updating that (e.g. through single user mode or by transferring the keychain files), login won't unlock it.

Even when "unlocked," there are still additional permissions required to read it, and it prompts the user for that. Anything that gets around that is considered a vulnerability. TBH I don't know exactly how the second part works and think it's unnecessarily confusing for a user who wants to know what permissions they're granting.
 
Last edited:
when i click on about this mac > software update, it doesn't show high sierra option .. i know i can manually download but why isn't it showing up as an update? ive only been using mac for a year .. not very proficient in mac os
 
The thing is, malicious hackers will almost certainly have cottoned on just as quickly as this guy did. Making it public means it goes up Apple's priority list to fix, which is a good thing.
 
As already disclosed, he made Apple aware of the bug in early September, shortly after discovering it. He didn't expose anyone. Apple did. He simply made the public aware of an unpatched bug.

Thereby exposing tens of millions of people. He even acknowledges himself that Apple hasn't had enough time to patch it:

As my discovery of this bug and report (in early September) was 'shortly' before High Sierra's release, this did not give Apple enough time to release a patch on time. However, my understanding is a patch will be forthcoming!
[doublepost=1506446059][/doublepost]
The thing is, malicious hackers will almost certainly have cottoned on just as quickly as this guy did.

No. This security flaw has been around for years, and nobody found it until now. There are decades-old security flaws lurking in all sorts of code.
 
when i click on about this mac > software update, it doesn't show high sierra option .. i know i can manually download but why isn't it showing up as an update? ive only been using mac for a year .. not very proficient in mac os
Open the App Store and go into Preferences and select "Install macOS updates" under the "Automatically check for updates" section.
Not sure if it applies to new version updates, but point releases upgrade jus fine.
It's not selected by default as many people prefer to control when their computers are upgraded.
 
If Apple knew about it anyway then they would have serious questions to answer.
There is a LOT companies know about that doesn't stop them releasing damaging hardware/software. A lot of companies also sail so close to the wind that it's only a matter of time before a problem presents itself.
 
I see...so a company that designs and manufactures USB IC chips and then offers drivers so you can actually use those chips with a mac is doing something that generally shouldn't be done.
Precisely! If their driver requires you to allow that company access to privileged areas of your system to use it, then when you allow it, it should be with the understanding of the risks. If the risk is not understood (and generally it’s not) then it generally shouldn’t be done. There are companies making millions and billions of dollars every year without requiring admin rights for an installation (both hardware and software), so it far more the rule rather than the exception.


How does that make the system less secure? There are many such examples I use personally and thousands more I don't but others do.
A macOS system running a third party system level addition is less secure than one that isn’t. For each addition, you’re that much less secure. It may not feel like it because you feel you can trust the vendors, BUT hackers that attack developer code bases do so BECAUSE they know people trust the source... if they can get in there, they will be deployed to hundreds/thousands of computers with admin permissions.
[doublepost=1506459831][/doublepost]
I wouldn’t. I’m glad he didn’t either. He forced Apple to make a fix a priority.
Apple set the priority when he told them about it (This is assuming that it wasn’t a bug already slated to be fixed. We only have his word to go on that Apple didn’t know about it.). At that point, it was going to be fixed on their timetable. That timetable hasn’t changed, they won’t be rushing out a release for this. It’ll be covered in the release it’s already planned to be completed in. SO, him standing in a pulpit preaching about an issue that’s NOT even that severe is all about self-promotion.

Some people like to promote themselves with he pretense that “I’m doing it for YOU!” Those with integrity usually don’t. Especially not with something that is essentially clickbait.
[doublepost=1506460824][/doublepost]
This is actually a serious bug. For those of you saying it requires convoluted steps in order to exploit (disabling Gatekeeper), it doesn't.
My rule of thumb for “how serious this is” always starts with “Am I required to interact and provide my admin credentials”. If so, then it’s not serious BUT that could be because I remember stories of systems being compromised with no input from the user. That, to me, is serious. Anything that counts on a user to make it work... well, that’s ALL exploits. You wouldn’t say that being able to delete a file that your placed in the trash is a serious bug just because I could coerce a user into deleting all their photos.

Are you saying that a developer signed app downloaded from outside the App Store would NOT bring up the “This app was downloaded from the internet” dialog that has to be dealt with?

running untrusted app is always a security risk
My point exactly.
[doublepost=1506462032][/doublepost]
If you got the information that a patch is forthcoming, wouldn't it have been better to perform a responsible disclosure and not publish the details before the patch is out? For after all, Apple had less than a month to react right before a major release, so it wouldn't be unreasonable to give them at least a full month.
See, you’re thinking about this from the wrong angle. Instead of the “I am a responsible security researcher” angle think more about the “If I can get this to go viral, my name will be EVERYWHERE!” angle.

THEN it makes total sense :)
 
Unfortunately, this isn't realistic. There are many applications that simply cannot abide by apple's rules.

Thankfully macOS isn't locked down like iOS, otherwise macOS apps would be one trick pony like iOS. Past few companies I've worked at have all used Macs. We 100% relied upon apps that were not in the app store. We'd have to use windows or linux.

The day I'm unable to use non Mac appStore for personal use on macOS, that would be the last day of using macOS; macOS would render itself utterly useless.

Maybe if the AppStore was the only way of obtaining apps, developers would write code in a compatible fashion? Right now, there is no incentive for them to change their way of thinking/ programming.
[doublepost=1506468815][/doublepost]
How about all those people on this forum who called me a jerk for refusing to update immediately come read this article? This kind of thing is exactly why I stay a year behind.

Well, this bug also affects your system. Secondly, you're likely affected by a whole heap of bugs fixed by High Sierra. Being 1 year behind is never a good thing.
 
From what I've read, this is not limited to High Sierra. I was thinking the same thing — wait for the x.1 update — but now that I know this affects my current 10.12.6 system, and I've trusted Keychain to my passwords for 16 years, there really is no reason _not_ to update. Updating does not introduce this vulnerability. It was just reported that way, sadly.
This is why I'm using another password manager now.
 
OMG, to enable this software you have to enter System Preferences, answer YES on two dialogues, and also enter your password. Then it may STEAL your not encoded things stored in the keychain (by default everything is stored encoded). I think I'm going to Windows now.

How can I downvote you? You are totally wrong. Do you realize that all it needs to sign an app is $99/year membership? There is no app review for macOS apps like it is for iOS. Anyone can sign any executable. If you pay your membership, you can sign an infected executable, and release it.
 
How can I downvote you? You are totally wrong. Do you realize that all it needs to sign an app is $99/year membership? There is no app review for macOS apps like it is for iOS. Anyone can sign any executable. If you pay your membership, you can sign an infected executable, and release it.
Buuuut, you can release what you want. If no one runs it, then it's not a very good exploit. Plus on my computer, downloading trusted signed software from the internet means you get a dialog saying "Hey, you're downloading this from the internet, are you SURE buddy?" Then you have to go make some settings changes before it'll actually install AND it will ask for your password.
 
Are you off your nut? So everyone would be exposed for 90 days or until Apple got off their buttocks to fix this - really?

This security hole has existed for years. Notifying the public of its existence without giving the vendor a chance to close it causes more harm than good.

E.g., Google has a policy of giving third parties 90 days' notice before disclosing a hole to the public.
 
On a related High Sierra update question - is it possible to update without changing over to AFS, the new file system? I don't have an SSD installed, and it seems like they're advising against AFS on anything but that.
If you upgrade to High Sierra, the filesystem change is included. You can't update to HS without getting the new filesystem.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.