Again, this isn't of much use unless the attacker has physical or network access to your Mac. That isn't to say that this isn't any less of a vulnerability than those they've fixed, but this one also isn't something that someone can target a Mac with remotely, and instantly have root access.
tl;dr: a lot of variables have to fall into place at the right time for this to have any major impact to a single machine.
BL.
You have waaaay too much time on your hands, lol ..... as do I apparentlyNever trust a person whose last name is an anagram for "scooted".
No I don't. Tried to track it down in the console and system log with out any luck. Just says unknown app. It could" get past the firewall without permission.
For the average user? Sure. But I know at least one university that is very nervous about their multiple computer labs full of iMacs. It's a pretty big deal.
That security researcher doesn't owe you or the richest company in the world anything. He's free to do whatever he wants.
I read somewhere that he only gave Apple a few hour's notice before releasing it. He's a scumbag. And I have to say that the writer of this article is sort of a scumbag if that screenshot is the code for the vulnerability (If this is true, sorry Juli).
The article at the top links to the POC code on github: https://github.com/kpwn/tpwn
I added the idea behind NULLGuard to SUIDGuard but with completely different (safer?) code: grab binary from http://suidguard.com
So in order to protect against the tpwn exploit you can just update your SUIDGuard installation to 1.0.6
Without meaning to sound facetious. How else would you attack a computer if you don’t have physical or network access? Or am I just being too simplistic?Again, this isn't of much use unless the attacker has physical or network access to your Mac. That isn't to say that this isn't any less of a vulnerability than those they've fixed, but this one also isn't something that someone can target a Mac with remotely, and instantly have root access.
tl;dr: a lot of variables have to fall into place at the right time for this to have any major impact to a single machine.
BL.
I don’t feel vulnerable at all at the moment, (maybe I should), but what I’m most eager to see is how quickly Apple react to this similar exploit.Of course it is not a courtesy to Apple, but a vulnerability can at any time be exploited. Giving Apple a wide timeframe creates the opportunity for delays and obscurity, as we have seen with the previous vulnerability. Just because that one developer doesn’t disclose it, doesn’t mean that no one else knows of it. I’d rather know of those vulnerabilities and take precautions. Apple should also feel a bit more heat and devote more resources to adequate security response.
I agree with you but large corporations have a set of ethics too and they don’t always abide by them. In fact behind the scenes I guarantee you they don’t. What they tend to do is weigh up the potential impact, subtract a bit for what they think will actually be the real impact, subtract a bit more for luck and then weigh this up against the cost and time they will have to suffer.That may be true, but developers have a set of ethics (s)he should abide by. He is showing a complete lack of ethics in the way that he released this. On every security list I have been on (including Secunia and Bugtraq) the discoverer of the vulnerability always would let the vendor know of the vulnerability and give them time to patch it before announcing the vulnerability. Even the JB teams here (TaIG, Pangu, evad3rs) do that. This guy did not.
If you think that is fair for him to do, perhaps you should reexamine your ethics as well.
BL.
And I have to say that the writer of this article is sort of a scumbag if that screenshot is the code for the vulnerability (If this is true, sorry Juli).
Too late, the vulnerability is already out. Don't blame Juli.I read somewhere that he only gave Apple a few hour's notice before releasing it. He's a scumbag. And I have to say that the writer of this article is sort of a scumbag if that screenshot is the code for the vulnerability (If this is true, sorry Juli).
Whoaaa! The fail is epic in this post! Noob alert! Have you EVER seen a Command shell on OS X? Just once maybe? But you do know that the concept of "command lines" exist on OS X? You know, the thingy with the keyboard...errr... okay, forget it! Keep tapping on your screen. Go on. Nothing to see here...
Did it ever occur to you that most people have absolutely no idea what a terminal looks like and don't care ?Whoaaa! The fail is epic in this post! Noob alert! Have you EVER seen a Command shell on OS X? Just once maybe? But you do know that the concept of "command lines" exist on OS X? You know, the thingy with the keyboard...errr... okay, forget it! Keep tapping on your screen. Go on. Nothing to see here...
If you want to assign developers ethics, then I guess you should start by mentioning the OS developers' ethics (meaning, Apple's). Apple:That may be true, but developers have a set of ethics (s)he should abide by.
Again, this isn't of much use unless the attacker has physical or network access to your Mac.
That's my point. If deployed in a lab, university, or enterprise environment, this could be severe. All it takes is compiling it one place for one type of architecture for it to be distributed to any other Mac.
However, in a lab or Enterprise environment, where it is mainly iMacs, they aren't going to be as portable. So Find My Mac wouldn't really need to be enabled on those, so the Guest Account wouldn't need to be enabled, allowing unfetted, password-free access to the iMac. If tied to some sort of Directory protocol (Active Directory, LDAP, etc.), such work could be traced to the person that released it. So while it may be a big deal, that university could easily bait this as a trap for the malevolent user.
That may be true, but developers have a set of ethics (s)he should abide by. He is showing a complete lack of ethics in the way that he released this. On every security list I have been on (including Secunia and Bugtraq) the discoverer of the vulnerability always would let the vendor know of the vulnerability and give them time to patch it before announcing the vulnerability. Even the JB teams here (TaIG, Pangu, evad3rs) do that. This guy did not.
If you think that is fair for him to do, perhaps you should reexamine your ethics as well.
BL.
Without meaning to sound facetious. How else would you attack a computer if you don’t have physical or network access? Or am I just being too simplistic?
I'm not so worried about this because a malicious problem can already do all the damage it needs without root access. This XKCD comic is relevant:
![]()
... Actually, my situation is a bit better because my secret stuff is encrypted in my keychain, root access or not, and I lock it. What more can they do with root access, wipe out my OS? Big deal.