Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
it Is Apple strategy to make Hackers useles.

Or

Apple wants their emoji users to feel like rock stars, accesing the system as root without knowing the password !! Yeah !!
 
  • Like
Reactions: xnu
This is worrying. Apple need to focus on Mac and stop rushing! What’s happening with Apple?
Perhaps they are focused on too many products these days.
First it was just the Mac they had to focus on, then came iPod, then came iPhone and iPad and Apple TV and Car Play and Air Pods and Apple Watch and now VR headsets.
Or does it come down to the respective teams (of each product) not having enough staff to achieve better results?
Or is there too much pressure coming from above to meet unrealistic deadlines?
Or is Apple chopping and changing all the time during the development process, and thus perhaps what was a tested/working OS component/idea is being scrapped and another idea/decision is being made/rushed in last minute?
 
  • Like
Reactions: 6803390
How is it that open source community-developed Linux has better security QA than Apple with all its huge resources and wealth?

The only answers I can think of are

1. organisational dysfunction

2. arrogance

could there be another explanation?
3. limited funding
4. macOS is mostly not open source

Bean counter Tim just didn't want to allocate Mac too much money.

Old Mac vs PC advertisements mock todays Apple badly. Just look at few of them, Mac has become PC.

 
  • Like
Reactions: xnu
This is literally the biggest security flaw possible if someone has physical access to a mac (which is pretty damn easy in an office environment - lunch breaks, evenings, weekends).

Just open the lid, boom you've got root access.

When the regular press finally understand what that actually means this is going to be very big news.
 
I've kept the installation packages and partitioned disks from multiple betas back when I was testing unsupported Mac functionality. :)
Nice, I haven't been keeping up-to-date any unsupported Macs lately. I assume the install process is similar to Sierra though, with a change to PlatformSupport.plist and LegacyUSBInjector.kext? :)
 
If someone knows the password of a user on your system, or your account is poorly protected, it is perfectly possible to do this remotely. You just have to remote into the macine, start a GUI shell with any user, go to preferences, and do the same steps in the news post. Then you can log in as root in the shell prompt, start a remote session from that, and you're good to go.

Any Mac with internet access and firewalls opened is vulnerable to this.

So many issues with this it's tough to know where to start.

"If someone knows the password of a user on your system". If someone knows your password to your admin user you pretty much deserve whatever happens.
"You just have to remote into the machine". SSH and Screen sharing are disabled by default.
"Start a GUI shell". Enlighten me how to "start a GUI shell" without Screen Sharing being explicitly enabled.

There's more but that seems enough.
[doublepost=1511910388][/doublepost]
Just open the lid, boom you've got root access.

No. Just open the lid and boom you have a login prompt.
 
[doublepost=1511910388][/doublepost]

No. Just open the lid and boom you have a login prompt.[/QUOTE]

You click "Other" and your type "Root" and hit return. So yes... boom you have root access.
 
[doublepost=1511910388][/doublepost]

No. Just open the lid and boom you have a login prompt.

You click "Other" and your type "Root" and hit return. So yes... boom you have root access.[/QUOTE]

Well, no, unless someone already enabled the root user. No.
 
  • Like
Reactions: Duane Martin
Much quicker way to change root password, open terminal and type: sudo passwd root Enter current password of current user and then Enter new password for root and boom!
 
Holy Hannah Batman!!! Really? Tim, you're a nice guy, you were "Mr. Logistics" under Steve, but this is a "This is ****!" thing that should never have slipped by. Your Achilles heel is showing once again, or should I say your High Sierra heel (whoops, no support under High Sierra for the billion fusion drives we've pushed out the door).
 
Holy Hannah Batman!!! Really? Tim, you're a nice guy, you were "Mr. Logistics" under Steve, but this is a "This is ****!" thing that should never have slipped by. Your Achilles heel is showing once again, or should I say your High Sierra heel (whoops, no support under High Sierra for the billion fusion drives we've pushed out the door).

I'm getting tired of saying it now, so I won't do so again, but people are acting like this is the first exploit on OS X, or it's any way related to Tim Cook and could not possibly have happened under Steve, but that simply isn't true. There has been at least one root exploit for every version of OS X

https://forums.macrumors.com/thread...-to-fix-updated.2091696/page-10#post-25529131
 
This is a very clean bug.

If you disable the root user after setting the password it is all back to buggy "normal" with the serious security issue.
 
This is a very clean bug.

If you disable the root user after setting the password it is all back to buggy "normal" with the serious security issue.

You should leave the root user enabled and set a good password.

Edit: just saw the article update. Apple says set a password while they work on the fix.
 
  • Like
Reactions: 2013.1
I did indeed. Got squat. Neither that nor the return key did anything more than bupkis other than bounce my dialog box.
[doublepost=1511909192][/doublepost]

I have second admin account on mine (wifey) and I can't exploit this either.

Are you using a Mac with Touch ID by chance? Wonder if having a Secure Enclave has something to do with certain people not being able to do this.
 
Are you using a Mac with Touch ID by chance? Wonder if having a Secure Enclave has something to do with certain people not being able to do this.

I can reproduce the bug without problem on my Macbook Pro with Touch ID.
[doublepost=1511911377][/doublepost]
Well, no, unless someone already enabled the root user. No.

Can users that have "Other..." because they are on a network log in as root like this without the root user being enabled? I am not able to test it.
 
Would this not allow for the same thing?

1. Log into single-user mode
2. Add a new admin account
3. Log into that new admin account
4. Enable the root user and set password
 
You click "Other" and your type "Root" and hit return. So yes... boom you have root access.

Well, no, unless someone already enabled the root user. No.[/QUOTE]


Again if you have only a single administrator account & the guest account is disabled you will not be able to login even with the root account enabled & password left blank .. There will be no option to choose another user .


Screen Shot 2017-11-28 at 2.13.52 PM.png
 
Well, no, unless someone already enabled the root user. No.


Again if you have only a single administrator account & the guest account is disabled you will not be able to login even with the root account enabled & password left blank .. There will be no option to choose another user .


View attachment 738926[/QUOTE]

What about macs on a network?
 
  • Like
Reactions: artfossil
Again if you have only a single administrator account & the guest account is disabled you will not be able to login even with the root account enabled & password left blank .. There will be no option to choose another user .
Typing option-return at the login window will bring up a name and password field even if you don't have another user enabled.
 
Just as an interesting side note… This doesn't happen on the command line. You can't "su root" with a blank password. The bug probably lies in the actual authentication challenge dialog. My guess you really don't get 'root' but you do get admin level access (possible debug code left in the build).
 
  • Like
Reactions: the johnmc
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.