www. O S N E W S .com
News Features Interviews
BlogContact Editorials

Reverse engineering the macOS High Sierra supplemental update
By Thom Holwerda on 2017-10-09 19:26:19

Reported by Matheus Mariano, a Brazilian software developer, a programming error was discovered in Appleā€™s most recent operating system, High Sierra, that exposed passwords of encrypted volumes as password hints. A serious bug that quickly made the headlines in technology websites everywhere.

Apple was prompt to provide macOS High Sierra Supplemental Update to customers via the App Store, and ensured that every distribution of High Sierra in their servers included this update.

I decided to apply a binary diffing technique to the update to learn more about the root cause of this bug and hypothesize about how the defect could have been prevented.

6  Comments - Printer friendly - Related stories
Recent related stories
- Apple prepares macOS for discontinuation of 32-bit app support - 2018-02-03
- Apple Addresses Meltdown and Spectre in macOS - 2018-01-23
- Reading disks from 1988 in 2018 - 2018-01-13
- Apple quickly fixes severe security flaw in macOS - 2017-11-29
- Apple open-sourced iOS and macOS kernel for ARM - 2017-10-02
- More related articles

Tell a friend
Your full name:
Your email address:
Your friend's email:
Anti-spam measure:

News Features Interviews
BlogContact Editorials

WAP site - RSS feed
© OSNews LLC 1997-2007. All Rights Reserved.
The readers' comments are owned and a responsibility of whoever posted them.
Prefer the desktop version of OSNews?