![]() ![]() Yet another flaw in the OS allowed programs that weren't approved by Apple the opportunity to steal passwords from the Mac keychain. A bug in High Sierra caused iMessage delivery errors for some users, while another bug in the OS exposed passwords for encrypted APFS volumes. This isn’t the first flaw with High Sierra there have been several. The "root" flaw could be used to gain privileges that could then allow the attacker to gain privileges to exploit the OS in ways that aren't normally possible. ![]() ![]() Wardle believes that this bug could be used by an attacker in a multistage attack. If a Root User is already enabled, to ensure a blank password is not set, please follow the instructions from the 'Change the root password' section.ĪrsTechnica spoke to a security researcher called Patrick Wardle from Synack about the bug. To enable the Root User and set a password, please follow the instructions here. In the meantime, setting a root password prevents unauthorized access to your Mac. We are working on a software update to address this issue. Apple may provide or recommend responses as a possible solution based on the information provided every potential issue may involve several factors not detailed in the conversations captured in an electronic forum and Apple can therefore provide no guarantee as to the. An Apple spokesperson addressed the exploit with the following statement: This site contains user submitted content, comments and opinions and is for informational purposes only. To block this bug from being exploited on your system, you can activate an account with the "root" username and a password. This flaw is reportedly in the current version of High Sierra 10.13.1 and the 10.13.2 beta. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |