A bug in OS X 10.8 Mountain Lion and 10.7 Lion allows attackers to gain superuser access if they reset the clock to 1 January 1970. The bug shouldn’t affect most people, as the attacker also needs shell access to the Mac, and the user must have enabled superuser access in the past.
Read original article
Subscribe today so you don’t miss any TidBITS articles!
Every week you’ll get tech tips, in-depth reviews, and insightful news analysis for discerning Apple users. For over 33 years, we’ve published professional, member-supported tech journalism that makes you smarter.
Registration confirmation will be emailed to you.
This site is protected by reCAPTCHA. The Google
Privacy Policy and
Terms of Service apply.
There is a partial workaround for this problem that I use. I edit the bash logout file .bash_logout to include this line:
sudo -K
(that's a capital K).
This will remove any past sudo shell access from your history and block this exploit but only when you logout from the shell. When using sudo for anything, I always create a new shell window in Terminal and exit when I'm done. This ensures that the logout script runs.
The best part is that if or when Apple fixes this, you don't really have to do anything because the only consequence to doing this is that you get the initial warning message each time you used sudo instead of just the first time.