Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Apple macOS vulnerability paves the way for system compromise with a single click
ZDNet ^ | By Charlie Osborne for Zero Day | August 13, 2018

Posted on 08/14/2018 12:57:01 PM PDT by Swordmaker

A security researcher uncovered a zero-day in Apple software by tweaking a few lines of code. Speaking at Defcon in Las Vegas last week, Patrick Wardle, Chief Research Officer of Digita Security, described his research into "synthetic" interactions with a user interface (UI) that can lead to severe macOS system security issues.

Synthetic events are when attackers can virtually "click" objects in order to load code without user consent. If a threat actor is able to "click" a security prompt and load a kernel extension, this could lead to the full compromise of an operating system.

"Via a single click, countless security mechanisms may be completely bypassed," the researcher says. "Run untrusted app? click ...allowed. Authorize keychain access? click ...allowed. Load 3rd-party kernel extension? click ...allowed. Authorize outgoing network connection? click ...allowed."

While some users may stop these kinds of attacks when warning dialogue appears, Wardle says that it is possible to synthetically generate clicks silently and in an invisible way -- a concept which the researcher says results in "everything pretty much go[ing] to hell."

The vulnerability at the heart of the issue is CVE-2017-7150, a bug impacting modern versions of Apple macOS software before version 10.13.

(Excerpt) Read more at zdnet.com ...


TOPICS: Business/Economy; Computers/Internet
KEYWORDS: applepinglist; macsecurity
This vulnerability and exploit requires that the target Mac be pre-compromised by a hacker who has both access to the computer locally and an administrator's password AND the password that allows alteration of the Kernel, which is now different from even the Unix Superuser SUDO password on a Mac.

Once that is done, then, yes, it will work, because the two lines of kernel code have been altered.

Gee, who would have guess if you ALTER THE KERNEL YOU CAN REMOTELY COMPROMISE THE COMPUTER! DUH!

1 posted on 08/14/2018 12:57:01 PM PDT by Swordmaker
[ Post Reply | Private Reply | View Replies]

To: Swordmaker

LOL — Color Swordmaker “not impressed”.


2 posted on 08/14/2018 12:59:43 PM PDT by House Atreides (BOYCOTT the NFL, its products and players 100% - PERMANENTLY)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

I can completely destroy any system by breaking into the premises and smash it with a hammer.


3 posted on 08/14/2018 1:00:55 PM PDT by fruser1
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Not to mention it’s only exploitable on older versions of OSX...


4 posted on 08/14/2018 1:02:01 PM PDT by dinodino
[ Post Reply | Private Reply | To 1 | View Replies]

To: ~Kim4VRWC's~; 1234; 5thGenTexan; AbolishCSEU; Abundy; Action-America; acoulterfan; AFreeBird; ...
ZDNet article reports on a MacOS Zero Day vulnerability they are calling malware although it does not exist in the wild and actually requires previous local access to the target Mac AND an Administrator’s name and password as well as access to the above UNIX SuperUser password to change the Kernal code, something even the SuperUser cannot do in new Macs. If all that is prepared in advance, then, yes, it could be a risk. —PING!


Apple Security Alert Ping!

If you want on or off the Mac Ping List, Freepmail me.

5 posted on 08/14/2018 1:02:13 PM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplaphobe bigot!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TheBattman

Thanks to the Battman for the heads up.


6 posted on 08/14/2018 1:03:31 PM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplaphobe bigot!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dinodino

Yup. . . .


7 posted on 08/14/2018 1:03:53 PM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplaphobe bigot!)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Swordmaker

what do you recommend for MacBook pro software protection/malware protection?


8 posted on 08/14/2018 1:36:45 PM PDT by Dick Vomer (2 Timothy 4:7 deo duce ferro comitante)
[ Post Reply | Private Reply | To 1 | View Replies]

To: House Atreides

No updates on my Mac.


9 posted on 08/14/2018 2:31:37 PM PDT by Eric in the Ozarks (Baseball players, gangsters and musicians are remembered. But journalists are forgotten.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: Swordmaker

That looks like a correct assessment.
Attacker needs to get inside the computer plus have superuser access.

Same as Unix.
Give someone superuser access and manage to get inside the computer with a virus, you can do just about anything.


10 posted on 08/14/2018 3:12:55 PM PDT by Zathras
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

bingo !


11 posted on 08/14/2018 3:36:08 PM PDT by Squantos (Be polite, be professional, but have a plan to kill everyone you meet ...)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Swordmaker

Man, so-called tech journalists (urinalists) will do anything, ANYTHING, to write a headline with “Apple”, “MacOS”, and “Vulnerability” in it.

This is just saying, if you have local access, and root, you can do anything.

Allow me to echo your assessment: “Well, D-UH!!”


12 posted on 08/14/2018 7:23:03 PM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 1 | View Replies]

To: Dick Vomer
what do you recommend for MacBook pro software protection/malware protection?

Nothing. The only people who ask that have recently come from the Windows environment. The Mac has essentially everything you need built in. You can get and run Malwarebytes from time to time, but there’s no reason to rn it in the background. One dirty little secret of all the commercial malware detectors is that for them to work, they MUST turn off the built in System Defender Apple provides to let any malware IN so they can detect it!

13 posted on 08/15/2018 12:20:24 AM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplaphobe bigot!)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Dick Vomer

Don’t blindly click to install every pop-up that wants you to (and enter your password).

Only install from known sources.


14 posted on 08/15/2018 10:40:47 AM PDT by TheBattman (Democrats-Progressives-Marxists-Socialists - redundant labels.)
[ Post Reply | Private Reply | To 8 | View Replies]

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson