{"id":10658,"date":"2017-11-29T10:30:17","date_gmt":"2017-11-29T18:30:17","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/11\/29\/news-4430\/"},"modified":"2017-11-29T10:30:17","modified_gmt":"2017-11-29T18:30:17","slug":"news-4430","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/11\/29\/news-4430\/","title":{"rendered":"Apple apologizes, issues Mac login security patch"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/06\/wwdc2017-hevc-macoshighsiera-100725612-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Wed, 29 Nov 2017 09:33:00 -0800<\/strong><\/p>\n<p>With great apology, Apple has rushed to respond to the <a href=\"https:\/\/www.computerworld.com\/article\/3239047\/apple-mac\/what-to-do-about-apple-s-shameful-mac-security-flaw.html\">appalling macOS High Sierra security flaw<\/a>, issuing a software update that has been made immediately available for download and will be automatically installed in existing Macs.<\/p>\n<p>Apple has shared the following statement:<\/p>\n<p class=\"linenums\">&#8220;Security is a top priority for every Apple product, and regrettably we stumbled with this release of macOS.<\/p>\n<p class=\"linenums\"> \u201cWhen our security engineers became aware of the issue Tuesday afternoon, we immediately began working on an update that closes the security hole. This morning, as of 8:00 a.m., the update is available for download, and starting later today it will be automatically installed on all systems running the latest version (10.13.1) of macOS High Sierra.\u00a0<\/p>\n<p class=\"linenums\"> \u201cWe greatly regret this error and we apologize to all Mac users, both for releasing with this vulnerability and for the concern it has caused. Our customers deserve better. We are\u00a0auditing our development processes to help prevent this from happening again.\u201d<\/p>\n<p>The flaw meant that anyone with physical access to a Mac could open the system in root mode just by typing the word root and leaving the password field blank, as explained here.<\/p>\n<p>Apple\u2019s <a href=\"https:\/\/support.apple.com\/en-us\/HT208315\" rel=\"nofollow\">security update page describes it thus<\/a>:<\/p>\n<p>\u201cImpact: An attacker may be able to bypass administrator authentication without supplying the administrator\u2019s password<\/p>\n<p>Description: A logic error existed in the validation of credentials. This was addressed with improved credential validation.\u201d<\/p>\n<p>What is important to note is that once this update is installed on your Mac you will need to re-enable the root user. That\u2019s probably not going to bother most Mac users, but may be significant to those system administrators in some deployments.<\/p>\n<p>\u201cIf you require the root user account on your Mac, you will need to\u00a0<a href=\"https:\/\/support.apple.com\/en-us\/HT204012\" rel=\"nofollow\">re-enable the root user and change the root user&#8217;s password<\/a>\u00a0after this update,\u201d Apple warns.<\/p>\n<p>Apple deserves some praise for reacting to the flaw so swiftly.<\/p>\n<p>While the problem should never have existed, the company has certainly acted fast, apologized and shown just how seriously it takes this problem.<\/p>\n<p>You can tell the company takes this very seriously as it has chosen to use its capacity to automatically update Macs.<\/p>\n<p>This is only the second time the company has chosen to do this, the first was way back in 2014 when it chose to use an automatic security update mechanism to deploy a fix for a critical vulnerability in NTP, or Network Time Protocol.<\/p>\n<p>\u00a0Apple at that time said the issue was sufficiently severe that it wanted to act fast to protect its customers.<\/p>\n<p>While I still think that the existence of the latest, quickly-patched flaw was not up to Apple\u2019s standard, the speed with which the company has issued this patch shows just how much more focused the company can be on security than some competitors.<\/p>\n<p>I advice all Mac users to update the OS immediately.<\/p>\n<p><strong>Google+?<\/strong>\u00a0If you use social media and happen to be a Google+ user, why not\u00a0join\u00a0<a href=\"https:\/\/plus.google.com\/u\/0\/communities\/102592251674546201152\" rel=\"nofollow\">AppleHolic&#8217;s Kool Aid Corner community<\/a>\u00a0and get involved with the conversation as we pursue the spirit of the New Model Apple?<\/p>\n<p><strong>Got a story? Please\u00a0<\/strong><a href=\"https:\/\/twitter.com\/jonnyevans_cw\" rel=\"nofollow\">drop me a line via Twitter<\/a>\u00a0and let me know. I&#8217;d like it if you chose to follow me there so I can let you know about new articles I publish and reports I find.<\/p>\n<p><a href=\"https:\/\/www.computerworld.com\/article\/3239027\/apple-mac\/apple-apologizes-issues-mac-login-security-patch.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/images.idgesg.net\/images\/article\/2017\/06\/wwdc2017-hevc-macoshighsiera-100725612-large.3x2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Jonny Evans| Date: Wed, 29 Nov 2017 09:33:00 -0800<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>With great apology, Apple has rushed to respond to the <a href=\"https:\/\/www.computerworld.com\/article\/3239047\/apple-mac\/what-to-do-about-apple-s-shameful-mac-security-flaw.html\">appalling macOS High Sierra security flaw<\/a>, issuing a software update that has been made immediately available for download and will be automatically installed in existing Macs.<\/p>\n<h2><strong>\u2018We greatly regret\u2019<\/strong><\/h2>\n<p>Apple has shared the following statement:<\/p>\n<blockquote>\n<p class=\"linenums\">&#8220;Security is a top priority for every Apple product, and regrettably we stumbled with this release of macOS.<\/p>\n<p class=\"linenums\"> \u201cWhen our security engineers became aware of the issue Tuesday afternoon, we immediately began working on an update that closes the security hole. This morning, as of 8:00 a.m., the update is available for download, and starting later today it will be automatically installed on all systems running the latest version (10.13.1) of macOS High Sierra.\u00a0<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3239027\/apple-mac\/apple-apologizes-issues-mac-login-security-patch.html#jump\">To read this article in full, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[11078,11271,714],"class_list":["post-10658","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-apple-mac","tag-operating-systems","tag-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10658","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=10658"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/10658\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=10658"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=10658"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=10658"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}