techwiz is not in the sudoers file. This incident will be reported.This has been one of my favorites.
Doesn't work with my wife.
techwiz is not in the sudoers file. This incident will be reported.This has been one of my favorites.
Doesn't work with my wife.
It would have meant a delay in 11.2, which might have been okay for many but I haven't been able to render a web page or restart reliably since 11.0. So I'll be happy with with that supplemental patch issued shortly that you mention.Wow I thought this would have been patched out in 11.2. Hopefully we will get a
supplemental patch shortly.
Except this bug is more like:
”Users” in UNIX operating systems are different from ”users” in our language. Apart from your own accounts, there are system accounts and service accounts (which you may have never heard of), like root and nobody. Sudo vulnerability works on all accounts, including service accounts.Does this bug affect su as well? I run a non administrator account as my main user account, so sudo doesn’t work.
They don’t HAVE to have physical access, the attacker just has to find a user that’s still trying to install the latest version of Flash.So is this a zero day, drive-by vulnerability? Or does the attacker have to have physical access?
Qualsys obviously really REALLY wanted to get their name out there, and now it is. Hope it was worth it for themFrom the sounds of things, Qualsys—the company that disclosed the exploit—is now taking a lot of heat for how they went about disclosing this issue.
Or what about any installation of a tool from, say Github / or poison a LibreOffice mirror?They don’t HAVE to have physical access, the attacker just has to find a user that’s still trying to install the latest version of Flash.
For a security conscious... actually, even security aware user though? Physical access is likely the best vector.
Why? I run a non-admin account on my mac precisely to avoid priv. escal. bugs.Except this bug is more like:
You: "sudo give me complete control of your system, even though I'm not in /etc/sudoers"
Computer: "okay"
... But for single-user computers it's not such a big deal, IMNSHO.
Essentially, this can only be done remotely if the user takes steps to make it happen.Or what about any installation of a tool from, say Github / or poison a LibreOffice mirror?
Not if this is payload put into any of a dozen utilities that a lot of ppl install (e.g. Zoom, Spotify, Chrome plugin, Firefox plugin), but I think that this is a major security issue, regardless.Essentially, this can only be done remotely if the user takes steps to make it happen.When you take that into account (that you have a user that will help you to exploit them) there are far easier ways for malicious actors to get to them. It could be as simple as a call from “Apple” asking a user to download and install this software for your protection.
There are SO many other social engineering vectors guaranteed to be more effective than this one.
No, but still their responsibility to fix.Not Apple's fault. macOS is built on an open source foundation with an open source kernel and boot loader. There are many more security issues for sure. As long as they patch quickly that's all we can expect of them.
Or Windows or macOS, yes. If it ends up in trusted software from a trusted location, that could be problem. However, no malware developer is going to try to work the code into those known code bases. Why? Because it’s far easier (and far far more successful) to try to get a user to download Zoom from www.bestsiteforzoom.foreals via an email, for example. And again, at that point, you’re right back to “getting the user to help you to exploit them” via social engineering.Not if this is payload put into any of a dozen utilities that a lot of ppl install (e.g. Zoom, Spotify, Chrome plugin, Firefox plugin), but I think that this is a major security issue, regardless.
And they do fix it. It's already patched. Just wasn't public. You know, process.No, but still their responsibility to fix.
In any OS distribution, there should be a single vendor taking responsibility for stuff like this.
Apple (mostly, entirely?) takes this stuff seriously, so we should get a patch soon.
Modifying the path would be no protection against a bad actor running the vulnerable version of sudo if it's still on disk.Binary packages for all sort of Linux distro and also MacOS. I didn’t tried it myself and it looks it installs Sudo command in /usr/local/bin instead of /usr/bin so I guess you should remove the original one or modify paths...
Download Sudo
Sudo is distributed in source and and binary package formats. For information on how the binary packages are built, see building packages. All source distributions and binary packages are signed with Todd’s PGP key. For .rpm and .deb packages, the signature is embedded in the package file...www.sudo.ws
Damn. This is a big deal. Glad they caught it.
It turns most fairly minor security issues into full-blown root exploits… fairly terrifying.
Apple rushing beta software to market, again.
Oh I thought this was first occurred in Catalina/Mavericks.High Sierra all over again.![]()