Kidding right?
My thoughts exactly. I mean that would mean me uninstalling Parallels and M$ Office, which means if I insist on using a Mac, no job. Unbelievable!No he's not kidding. Many apple fanatics subscribed to the belief that you shouldn't download apps outside of the app store onto your Macbook. How they manage to stick only to the app store is a mystery to me.
Hi, patrick here! I contacted apple's product security team via email and text in early September (shortly after discovering the bug). I provided a detailed writeup and source code of a PoC exploit, and followed up with them after the submission. I understand that as this was 'shortly' before High Sierra's release, they were not able to release a patch on time. However, my understanding is a patch will be forthcomingWould have been great if he contacted Apple before the OS was released. Just looking for attention. Jerk
Though I reported the bug to Apple, as their bug bounty program is iOS only, I'll make $0.0 dollars.How much will money with this guy make for highlighting the vulnerability?
I have no reason to believe it isn't you but, (no sarcasm), thanks for the update. I get the impression they've known about this anyway.Hi, patrick here! I contacted apple's product security team via email and text in early September (shortly after discovering the bug). I provided a detailed writeup and source code of a PoC exploit, and followed up with them after the submission. I understand that as this was 'shortly' before High Sierra's release, they were not able to release a patch on time. However, my understanding is a patch will be forthcoming
[doublepost=1506405232][/doublepost]
Though I reported the bug to Apple, as their bug bounty program is iOS only, I'll make $0.0 dollars.
Post number 205 for you. I think an apology is in order?Would have been great if he contacted Apple before the OS was released. Just looking for attention. Jerk
I have no reason to believe it isn't you but, (no sarcasm), thanks for the update. I get the impression they've known about this anyway.
[doublepost=1506406145][/doublepost]
Post number 205 for you. I think an apology is in order?
No - you're notWell, I am still on El Capitan so I should be fine for now.
Hi, patrick here! I contacted apple's product security team via email and text in early September (shortly after discovering the bug). I provided a detailed writeup and source code of a PoC exploit, and followed up with them after the submission. I understand that as this was 'shortly' before High Sierra's release, they were not able to release a patch on time. However, my understanding is a patch will be forthcoming![]()
Though I reported the bug to Apple, as their bug bounty program is iOS only, I'll make $0.0 dollars.
I also don't update until the final release of the previous OS just before the latest version releases - but in this case, it doesn't matter - we're still vulnerable.How about all those people on this forum who called me a jerk for refusing to update immediately come read this article? This kind of thing is exactly why I stay a year behind.
I buy Mac apps outside the MAS, but I never install unsigned Mac apps (i.e. “Allow apps downloaded from: App Store and identified developers”), and never from developers without a well-established reputation (which, for example, would exclude your fame-seeking friend).No he's not kidding. Many apple fanatics subscribed to the belief that you shouldn't download apps outside of the app store onto your Macbook. How they manage to stick only to the app store is a mystery to me.
Hi, patrick here! I contacted apple's product security team via email and text in early September (shortly after discovering the bug). I provided a detailed writeup and source code of a PoC exploit, and followed up with them after the submission. I understand that as this was 'shortly' before High Sierra's release, they were not able to release a patch on time. However, my understanding is a patch will be forthcoming![]()
This genuinely sucks. Apple should extend the bug bounty program to macOS as well. Findings like this one deserve a bounty.
Hi, patrick here! I contacted apple's product security team via email and text in early September (shortly after discovering the bug). I provided a detailed writeup and source code of a PoC exploit, and followed up with them after the submission. I understand that as this was 'shortly' before High Sierra's release, they were not able to release a patch on time. However, my understanding is a patch will be forthcoming
[doublepost=1506405232][/doublepost]
Though I reported the bug to Apple, as their bug bounty program is iOS only, I'll make $0.0 dollars.
So, assuming we can believe your timeline, that’s ~18 days? I’m sure your mom must be proud, but that’s not considered to be sufficient time to get a patch released when you’re documenting the exploit. Did you also tell their security team that you would be dumping the exploit on release day?
It would certainly be interesting to see the original, unaltered email chain (headers and all).
Nope. Bug bounties are about responsible disclosure, something Patrick doesn’t appear to know anything about.
This the perfect forum thread.
Loads of likes for people who keep posting "What a jerk for not telling Apple first".
He did. A month ago.
How about all those people on this forum who called me a jerk for refusing to update immediately come read this article? This kind of thing is exactly why I stay a year behind.
Nope. Bug bounties are about responsible disclosure, something Patrick doesn’t appear to know anything about.
That's not accurate. In the jargon of computer security, "Day Zero" is the day on which the interested party (presumably the vendor of the targeted system) learns of the vulnerability. Up until that day, the vulnerability is known as a zero-day vulnerability.If the code is decades old, it's not technically zero-day.
As already disclosed, he made Apple aware of the bug in early September, shortly after discovering it. He didn't expose anyone. Apple did. He simply made the public aware of an unpatched bug.He made everyone aware of the issue, possibly without giving Apple time to fix it. Thus, he exposed people.
See above. Did it ever occur to you that he may have waited until release day to see if Apple included a patch for the bug he reported to them? Since the patch wasn't included in the release, he did a service to users by making them aware of the flaw.Unless he just found this bug today it is distasteful that he waited until the public release to disclose it.
See aboveI thought unwritten rule was to share details with developer first & give them 30 days to fix it then release the information to public.
He didn't release the exploit. He released information about the exploit, but did not release all the code required to implement it.Well, you don’t protect people by releasing the exploit to the public. You give the offending party time to correct and then shame them if they dont
See above.Fair enough, but when did he notify them? Today? Yesterday? Last Week? It is normal for companies not to respond to these submissions(at least on the record) for many reasons but how long did he give Apple to fix this issue before going public? If we find out it was 2-3 months ago this is fair.
Yes, he did. See above.To my knowledge, Patrick has not given a specific timeline as to when he acted.
He didn't publish any exploit; only information about it.Publishing exploits is cyber-terrorism. These people should be jailed.
If Apple knew about it anyway then they would have serious questions to answer.I have no reason to believe it isn't you but, (no sarcasm), thanks for the update. I get the impression they've known about this anyway.
Riiight...because it is a single guy being a "jerk" and not sloppiness on the part of a near-Trillion dollar company.Would have been great if he contacted Apple before the OS was released. Just looking for attention. Jerk