Free Republic
Browse · Search
General/Chat
Topics · Post Article

This vulnerability and exploit requires that the target Mac be pre-compromised by a hacker who has both access to the computer locally and an administrator's password AND the password that allows alteration of the Kernel, which is now different from even the Unix Superuser SUDO password on a Mac.

Once that is done, then, yes, it will work, because the two lines of kernel code have been altered.

Gee, who would have guess if you ALTER THE KERNEL YOU CAN REMOTELY COMPROMISE THE COMPUTER! DUH!

1 posted on 08/14/2018 12:57:01 PM PDT by Swordmaker
[ Post Reply | Private Reply | View Replies ]


To: Swordmaker

LOL — Color Swordmaker “not impressed”.


2 posted on 08/14/2018 12:59:43 PM PDT by House Atreides (BOYCOTT the NFL, its products and players 100% - PERMANENTLY)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

I can completely destroy any system by breaking into the premises and smash it with a hammer.


3 posted on 08/14/2018 1:00:55 PM PDT by fruser1
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

Not to mention it’s only exploitable on older versions of OSX...


4 posted on 08/14/2018 1:02:01 PM PDT by dinodino
[ Post Reply | Private Reply | To 1 | View Replies ]

To: ~Kim4VRWC's~; 1234; 5thGenTexan; AbolishCSEU; Abundy; Action-America; acoulterfan; AFreeBird; ...
ZDNet article reports on a MacOS Zero Day vulnerability they are calling malware although it does not exist in the wild and actually requires previous local access to the target Mac AND an Administrator’s name and password as well as access to the above UNIX SuperUser password to change the Kernal code, something even the SuperUser cannot do in new Macs. If all that is prepared in advance, then, yes, it could be a risk. —PING!


Apple Security Alert Ping!

If you want on or off the Mac Ping List, Freepmail me.

5 posted on 08/14/2018 1:02:13 PM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplaphobe bigot!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: TheBattman

Thanks to the Battman for the heads up.


6 posted on 08/14/2018 1:03:31 PM PDT by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you hoplaphobe bigot!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

what do you recommend for MacBook pro software protection/malware protection?


8 posted on 08/14/2018 1:36:45 PM PDT by Dick Vomer (2 Timothy 4:7 deo duce ferro comitante)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

That looks like a correct assessment.
Attacker needs to get inside the computer plus have superuser access.

Same as Unix.
Give someone superuser access and manage to get inside the computer with a virus, you can do just about anything.


10 posted on 08/14/2018 3:12:55 PM PDT by Zathras
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

bingo !


11 posted on 08/14/2018 3:36:08 PM PDT by Squantos (Be polite, be professional, but have a plan to kill everyone you meet ...)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: Swordmaker

Man, so-called tech journalists (urinalists) will do anything, ANYTHING, to write a headline with “Apple”, “MacOS”, and “Vulnerability” in it.

This is just saying, if you have local access, and root, you can do anything.

Allow me to echo your assessment: “Well, D-UH!!”


12 posted on 08/14/2018 7:23:03 PM PDT by dayglored ("Listen. Strange women lying in ponds distributing swords is no basis for a system of government.")
[ Post Reply | Private Reply | To 1 | View Replies ]

Free Republic
Browse · Search
General/Chat
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson