	{"id":11363,"date":"2013-03-07T09:01:13","date_gmt":"2013-03-07T17:01:13","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=11363"},"modified":"2013-04-03T12:22:09","modified_gmt":"2013-04-03T19:22:09","slug":"unfixed-sudo-vulnerability-restates-the-obvious-owned-boxes-are-owned","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/unfixed-sudo-vulnerability-restates-the-obvious-owned-boxes-are-owned\/","title":{"rendered":"Unfixed Sudo Vulnerability Restates the Obvious: Owned Boxes are Owned"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-11405\" title=\"shady-keyboard-blog-header\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/shady-keyboard-blog-header.jpg\" alt=\"\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/shady-keyboard-blog-header.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/shady-keyboard-blog-header-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/shady-keyboard-blog-header-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>There&#8217;s a universal truism in computer security that we&#8217;re periodically reminded of by news of breaches or new vulnerabilities: if someone has physical access to your system (or you give them access by way of a remote access tool), the system is no longer yours. They can do with your system and its data whatever they like. There are many ways they can do things like read your data or gain root access, even if you are running from a less privileged user account. We see trojans do it all the time.<\/p>\n<p>A long-standing, known vulnerability in a component that OS X shares with Linux distributions was <a href=\"http:\/\/www.sudo.ws\/sudo\/alerts\/epoch_ticket.html\">recently given a CVE <\/a>and fixed, but only for Linux versions. The short of it is, if someone has physical access (or access by remote control) to your machine, they can gain root permission by fiddling with your clock. And as we should all know by now, if someone has physical access to your machine, they now own it and all your data on it. This is true whether it&#8217;s your machine or it&#8217;s a public machine like at a library or at school. Don&#8217;t put any data on these public machines that you wouldn&#8217;t post in clear text on your Facebook page, because it&#8217;s there for anyone to do whatever they wish with it. And be sure to run security software to help keep your machine from being &#8220;owned&#8221; by remote access trojans.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There&#8217;s a universal truism in computer security that we&#8217;re periodically reminded of by news of breaches or new vulnerabilities: if someone has physical access to your system (or you give them access by way of a remote access tool), the system is no longer yours. They can do with your system and its data whatever [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":11407,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[309,168,144],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"There&#039;s a universal truism in computer security that we&#039;re periodically reminded of by news of breaches or new vulnerabilities: if someone has physical\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/unfixed-sudo-vulnerability-restates-the-obvious-owned-boxes-are-owned\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Unfixed Sudo Vulnerability Restates the Obvious: Owned Boxes are Owned - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"There&#039;s a universal truism in computer security that we&#039;re periodically reminded of by news of breaches or new vulnerabilities: if someone has physical\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/unfixed-sudo-vulnerability-restates-the-obvious-owned-boxes-are-owned\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-03-07T17:01:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-04-03T19:22:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/shady-keyboard-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unfixed-sudo-vulnerability-restates-the-obvious-owned-boxes-are-owned\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/shady-keyboard-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/shady-keyboard-thumb.jpg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unfixed-sudo-vulnerability-restates-the-obvious-owned-boxes-are-owned\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/unfixed-sudo-vulnerability-restates-the-obvious-owned-boxes-are-owned\/\",\"name\":\"Unfixed Sudo Vulnerability Restates the Obvious: Owned Boxes are Owned - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unfixed-sudo-vulnerability-restates-the-obvious-owned-boxes-are-owned\/#primaryimage\"},\"datePublished\":\"2013-03-07T17:01:13+00:00\",\"dateModified\":\"2013-04-03T19:22:09+00:00\",\"description\":\"There's a universal truism in computer security that we're periodically reminded of by news of breaches or new vulnerabilities: if someone has physical\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unfixed-sudo-vulnerability-restates-the-obvious-owned-boxes-are-owned\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/unfixed-sudo-vulnerability-restates-the-obvious-owned-boxes-are-owned\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unfixed-sudo-vulnerability-restates-the-obvious-owned-boxes-are-owned\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Unfixed Sudo Vulnerability Restates the Obvious: Owned Boxes are Owned\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unfixed-sudo-vulnerability-restates-the-obvious-owned-boxes-are-owned\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unfixed-sudo-vulnerability-restates-the-obvious-owned-boxes-are-owned\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Unfixed Sudo Vulnerability Restates the Obvious: Owned Boxes are Owned\",\"datePublished\":\"2013-03-07T17:01:13+00:00\",\"dateModified\":\"2013-04-03T19:22:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unfixed-sudo-vulnerability-restates-the-obvious-owned-boxes-are-owned\/#webpage\"},\"wordCount\":251,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/unfixed-sudo-vulnerability-restates-the-obvious-owned-boxes-are-owned\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/shady-keyboard-thumb.jpg\",\"keywords\":[\"Linux\",\"OS X\",\"Vulnerability\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/unfixed-sudo-vulnerability-restates-the-obvious-owned-boxes-are-owned\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"There's a universal truism in computer security that we're periodically reminded of by news of breaches or new vulnerabilities: if someone has physical","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/unfixed-sudo-vulnerability-restates-the-obvious-owned-boxes-are-owned\/","og_locale":"en_US","og_type":"article","og_title":"Unfixed Sudo Vulnerability Restates the Obvious: Owned Boxes are Owned - The Mac Security Blog","og_description":"There's a universal truism in computer security that we're periodically reminded of by news of breaches or new vulnerabilities: if someone has physical","og_url":"https:\/\/www.intego.com\/mac-security-blog\/unfixed-sudo-vulnerability-restates-the-obvious-owned-boxes-are-owned\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-03-07T17:01:13+00:00","article_modified_time":"2013-04-03T19:22:09+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/shady-keyboard-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/unfixed-sudo-vulnerability-restates-the-obvious-owned-boxes-are-owned\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/shady-keyboard-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/shady-keyboard-thumb.jpg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/unfixed-sudo-vulnerability-restates-the-obvious-owned-boxes-are-owned\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/unfixed-sudo-vulnerability-restates-the-obvious-owned-boxes-are-owned\/","name":"Unfixed Sudo Vulnerability Restates the Obvious: Owned Boxes are Owned - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/unfixed-sudo-vulnerability-restates-the-obvious-owned-boxes-are-owned\/#primaryimage"},"datePublished":"2013-03-07T17:01:13+00:00","dateModified":"2013-04-03T19:22:09+00:00","description":"There's a universal truism in computer security that we're periodically reminded of by news of breaches or new vulnerabilities: if someone has physical","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/unfixed-sudo-vulnerability-restates-the-obvious-owned-boxes-are-owned\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/unfixed-sudo-vulnerability-restates-the-obvious-owned-boxes-are-owned\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/unfixed-sudo-vulnerability-restates-the-obvious-owned-boxes-are-owned\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Unfixed Sudo Vulnerability Restates the Obvious: Owned Boxes are Owned"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/unfixed-sudo-vulnerability-restates-the-obvious-owned-boxes-are-owned\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/unfixed-sudo-vulnerability-restates-the-obvious-owned-boxes-are-owned\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Unfixed Sudo Vulnerability Restates the Obvious: Owned Boxes are Owned","datePublished":"2013-03-07T17:01:13+00:00","dateModified":"2013-04-03T19:22:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/unfixed-sudo-vulnerability-restates-the-obvious-owned-boxes-are-owned\/#webpage"},"wordCount":251,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/unfixed-sudo-vulnerability-restates-the-obvious-owned-boxes-are-owned\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/shady-keyboard-thumb.jpg","keywords":["Linux","OS X","Vulnerability"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/unfixed-sudo-vulnerability-restates-the-obvious-owned-boxes-are-owned\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/shady-keyboard-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-2Xh","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/11363"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=11363"}],"version-history":[{"count":7,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/11363\/revisions"}],"predecessor-version":[{"id":11415,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/11363\/revisions\/11415"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/11407"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=11363"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=11363"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=11363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}