|Reverse engineering the macOS High Sierra supplemental update|
|By Thom Holwerda on 2017-10-09 19:26:19|
Reported by Matheus Mariano, a Brazilian software developer, a programming error was discovered in Apple’s most recent operating system, High Sierra, that exposed passwords of encrypted volumes as password hints. A serious bug that quickly made the headlines in technology websites everywhere.
Apple was prompt to provide macOS High Sierra Supplemental Update to customers via the App Store, and ensured that every distribution of High Sierra in their servers included this update.
I decided to apply a binary diffing technique to the update to learn more about the root cause of this bug and hypothesize about how the defect could have been prevented.
- Apple Addresses Meltdown and Spectre in macOS - 2018-01-23
- Reading disks from 1988 in 2018 - 2018-01-13
- Apple quickly fixes severe security flaw in macOS - 2017-11-29
- Apple open-sourced iOS and macOS kernel for ARM - 2017-10-02
- More related articles