Quantcast
Channel: iTWire - Entertainment
Viewing all articles
Browse latest Browse all 4710

Apple fixes Keychain vulnerability, but only in macOS High Sierra

$
0
0
Apple fixes Keychain vulnerability, but only in macOS High Sierra

The zero-day vulnerability in macOS's Keychain has been addressed by Apple, along with some other issues in High Sierra. But other recent versions of the operating system are still vulnerable.

Keychain is a convenient feature of macOS that provides encrypted storage for passwords, cryptographic keys, certificates and other sensitive information.

The Keychain feature makes provision for multiple keychains (sets of passwords, etc), but in practice most users store their data in the login keychain, which by default has the same password as that used to log into the system.

Normally, when applications add passwords to a keychain they limit access to themselves and related software. For example, the password used by Safari to decrypt autofill data is only accessible by Safari, while a password used to connect to a SMB server is available to NetAuth, NetAuthAgent and NetAuthSysAgent.

{loadposition stephen08}Just before High Sierra was released, security researcher Patrick Wardle disclosed the existence of a vulnerability that allowed an application to extract in plaintext form all the passwords stored in a keychain.

Despite Wardle's detailed private notification, Apple went ahead and released High Sierra with this vulnerability. At least it wasn't remotely exploitable, but over the years some Mac users have been taken in by various Trojans, so there was a practical route for exploiting the vulnerability.

Apple released macOS High Sierra 10.13 Supplemental Update overnight to patch the vulnerability, crediting Wardle as the discoverer.

The issue is described thus: "A method existed for applications to bypass the keychain access prompt with a synthetic click. This was addressed by requiring the user password when prompting for keychain access."

The update also addresses another password-related issue in High Sierra: "If a hint was set in Disk Utility when creating an APFS encrypted volume, the password was stored as the hint. This was addressed by clearing hint storage if the hint was the password, and by improving the logic for storing hints."

If we're reading that correctly, it means that someone asking for the password hint was actually shown the password instead. So if you did set a hint, then if anyone has had physical access to your computer after High Sierra was installed it might be wise to investigate changing the disk encryption password.

Non-security changes in the update "Improves installer robustness," "Fixes a cursor graphic bug when using Adobe InDesign," and Resolves an issue where email messages couldn’t be deleted from Yahoo accounts in Mail".

The update is available via the Mac App Store or from Apple's web site.

But according to Wardle, macOS Sierra 10.12 is also vulnerable, and "El Capitan appears vulnerable as well."

There is no indication from Apple that a fix will be forthcoming for those versions. The company's position - which can only be inferred from what it does and does not release - seems to be that if a newer version of an operating system has the same hardware requirements as its predecessor, it feels no compulsion to offer a patch for the latter.

However, some users are unable to upgrade from Sierra to High Sierra until compatible versions of the applications they use are released, eg Adobe Illustrator.

And sometimes it appears that seemingly important security patches get thrown into the 'too hard' basket - for example, the Broadpwn issue was only addressed in Sierra (and later), but it has been shown to affect Yosemite and El Capitan, and not all Macs running Yosemite can be upgraded to Sierra.


Viewing all articles
Browse latest Browse all 4710

Trending Articles