11-30-2017 , 09:16 PM
http://www.majorgeeks.com/news/story/app...ility.html Apple Patches MacOS High Sierra Security Fix for Critical Root Vulnerability
Posted by: Timothy Tibbetts on 11/30/2017 10:46 AM [ Comments ]
Apple has quickly patched the critical root vulnerability we reported on yesterday.
Here are the details per Apple:
"SECURITY UPDATE 2017-001
Released November 29, 2017
Directory Utility
Available for: macOS High Sierra 10.13.1
Not impacted: macOS Sierra 10.12.6 and earlier
Impact: An attacker may be able to bypass administrator authentication without supplying the administrator’s password
Description: A logic error existed in the validation of credentials. This was addressed with improved credential validation.
CVE-2017-13872
When you install Security Update 2017-001 on your Mac, the build number of macOS will be 17B1002. Learn how to find the macOS version and build number on your Mac.
If you require the root user account on your Mac, you can enable the root user and change the root user’s password."
Apple took care of this one quickly and all Mac users should update immediately.
Posted by: Timothy Tibbetts on 11/30/2017 10:46 AM [ Comments ]
Apple has quickly patched the critical root vulnerability we reported on yesterday.
Here are the details per Apple:
"SECURITY UPDATE 2017-001
Released November 29, 2017
Directory Utility
Available for: macOS High Sierra 10.13.1
Not impacted: macOS Sierra 10.12.6 and earlier
Impact: An attacker may be able to bypass administrator authentication without supplying the administrator’s password
Description: A logic error existed in the validation of credentials. This was addressed with improved credential validation.
CVE-2017-13872
When you install Security Update 2017-001 on your Mac, the build number of macOS will be 17B1002. Learn how to find the macOS version and build number on your Mac.
If you require the root user account on your Mac, you can enable the root user and change the root user’s password."
Apple took care of this one quickly and all Mac users should update immediately.