Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Apple on Mac flaw: ‘We apologize to all Mac users. Our customers deserve better.
MacDailyNews ^ | November 29, 2017

Posted on 11/29/2017 3:49:52 PM PST by Swordmaker

"We are auditing our development processes."

“Apple Inc said on Wednesday it would review its software development process a day after a researcher discovered a bug in a new version of its Mac operating system that could give hackers total control of vulnerable machines,” Stephen Nellis reports for Reuters. “Apple said it released a patch to fix the bug on Wednesday morning and it would be automatically installed on vulnerable machines later in the day.”

“‘We greatly regret this error and we apologize to all Mac users,’ Apple said in a statement. ‘Our customers deserve better. We are auditing our development processes to help prevent this from happening again,'” Nellis reports. “The U.S. and German governments issued alerts advising Mac users to install the patch.”

“Apple said its security engineers learned of the problem on Tuesday afternoon and posted the patch within 24 hours,” Nellis reports. “‘Security is a top priority for every Apple product, and regrettably we stumbled with this release of Mac OS,’ Apple said in its statement.”

Read more in the full article here.

MacDailyNews Take: Perhaps this latest snafu has finally been the wake up call Apple needed.

We trust Apple to stay true to their word and expect them to up their game (not just in software, but across the board) which, in recent years, simply has not measured up to the fastidious level of excellence set and maintained for so long by Steve Jobs.

Be a yardstick of quality. Some people aren’t used to an environment where excellence is expected. — Steve Jobs



TOPICS: Business/Economy; Computers/Internet
KEYWORDS: applemac; applepinglist; patch; rootvulnerability; security
Navigation: use the links below to view more comments.
first previous 1-2021-29 last
To: CGASMIA68
Disregard my last post. I just went in and see the security update availability. Reason for my post was I looked this AM and didnt see it. Its there now

No problem. . . such stupidity is always a disappointment when we expect better from Apple.

21 posted on 11/29/2017 10:39:57 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 8 | View Replies]

To: Swordmaker
In fact, Cynwoody, until yesterday, Chethan177's comment of November 13, 2017, WAS THE LAST COMMENT IN THE THREAD! All following comments relative to Chethan177's were made after November 28th when someone made a search of Apple forums for anything related to Root access.

Are you trying to 'splain something to me?

The bare-faced fact is, AAPL f-ed up.

Yep. There was a two-week hang-fire before the zero-day went off.

But I highly doubt it was someone searching for root access. Plainly, it was someone who chanced on the thread and realized, WTF‽

22 posted on 11/29/2017 11:53:48 PM PST by cynwoody
[ Post Reply | Private Reply | To 20 | View Replies]

To: Pollard

Indeed.


23 posted on 11/30/2017 1:55:46 AM PST by markomalley (Nothing emboldens the wicked so greatly as the lack of courage on the part of the good -- Leo XIII)
[ Post Reply | Private Reply | To 12 | View Replies]

To: Swordmaker

When I 1st read the alert I thought it required some one sitting at the device. I typed “root” in one time to see the result and it didnt work so i waited a day and saw your post. Swarched for the update and saw it. You were ahead of the curve on this one fer sure and thanks.


24 posted on 11/30/2017 4:41:22 AM PST by CGASMIA68
[ Post Reply | Private Reply | To 17 | View Replies]

To: cynwoody
Are you trying to 'splain something to me?

Not really. I was just taking the opportunity to share my exploration of the facts I discovered when everyone else is claiming that "obviously Apple has had this exploit for at least two weeks before doing anything about it!" meme. When I went to check if that were actually true, I found, no, it wasn't.

They were building a mountain out of a non-existent molehill from this LAST COMMENT in an obscure thread on a forum among thousands that no one, including Apple if you understood the nature of the forum, had looked at since Chethan177 wrote it more than two weeks ago.

The funny thing is that had Chethan177 reported it to Apple, he likely could have claimed a significant bug bounty worth many thousands of dollars, because Apple is paying good money for such bugs now. . . the more egregious the bug, the more they pay. They have paid up to $1 million for really significant bugs in iOS.

25 posted on 11/30/2017 9:41:29 AM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 22 | View Replies]

To: BradyLS

Worse - at least the “123456” password is a password - horrendously weak that it is... it’s at least SOMETHING in that field... To allow a bug that opens ROOT access without any password at all is insane...


26 posted on 11/30/2017 9:42:15 PM PST by TheBattman (Gun control works - just ask Chicago...)
[ Post Reply | Private Reply | To 19 | View Replies]

To: Swordmaker

Thanks for the backstory. I note CoyoteDen is a “Level 1 user with 0 points” who understood the implications of what was uncovered when they saw it.

What are the chances that this is an easy-access exploit that the MacOS developers use routinely when putting together/testing updates and, in this instance, they forgot to “close the door” when that update was wrapped up?


27 posted on 11/30/2017 10:23:43 PM PST by BradyLS (DO NOT FEED THE BEARS! I)
[ Post Reply | Private Reply | To 25 | View Replies]

To: Swordmaker

And I want to thank you also for all the work you put into tracking down the truth behind how that angle of the story developed. Would that real journalists did as much and as fast!


28 posted on 11/30/2017 10:27:21 PM PST by BradyLS (DO NOT FEED THE BEARS! I)
[ Post Reply | Private Reply | To 25 | View Replies]

To: BradyLS
What are the chances that this is an easy-access exploit that the MacOS developers use routinely when putting together/testing updates and, in this instance, they forgot to “close the door” when that update was wrapped up?

That's exactly what I think happened.

29 posted on 11/30/2017 10:38:11 PM PST by Swordmaker (My pistol self-identifies as an iPad, so you must accept it in gun-free zones, you racist, bigot!)
[ Post Reply | Private Reply | To 27 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-29 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson