	{"id":133,"date":"2008-04-23T09:28:59","date_gmt":"2008-04-23T08:28:59","guid":{"rendered":"http:\/\/blog.intego.com\/?p=133"},"modified":"2008-04-23T09:28:59","modified_gmt":"2008-04-23T08:28:59","slug":"mac-hack-vulnerability-had-been-public-for-months","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/mac-hack-vulnerability-had-been-public-for-months\/","title":{"rendered":"Mac Hack Vulnerability Had Been Public for Months"},"content":{"rendered":"<p>Last month, we reported about a Mac hack contest where a <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-hacked-in-two-minutes-flat\/\">Mac was hacked in two minutes flat<\/a>. Initial reports suggested that the security researcher, Charlie Miller, who hacked the Mac, had discovered the vulnerability used just a couple of weeks before the contest. Well, <a href=\"http:\/\/www.macworld.com\/article\/133098\/2008\/04\/hack.html\">Macworld reports<\/a> that this flaw had been made public in November 2007, and Apple had not patched it, allowing Miller to discover it &#8220;completely independently&#8221;. <\/p>\n<p>The flaw in question affects the open-source PCRE software library, which is used by Safari. Developers corrected the flaw quickly, but Apple didn&#8217;t update the library until last week. Whether or not Miller actually discovered this flaw on his own, it shows one of the big problems of Mac OS X, and its reliance one third-party software: many flaws and vulnerabilities may be quickly fixed by the developers of this software, but it often takes Apple months to roll the fixes into Mac OS X. Astute hackers can easily find out what has been fixed in the underlying software, and be aware that Apple likely hasn&#8217;t fixed it as quickly, leading to vectors of attack against Macs. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last month, we reported about a Mac hack contest where a Mac was hacked in two minutes flat. Initial reports suggested that the security researcher, Charlie Miller, who hacked the Mac, had discovered the vulnerability used just a couple of weeks before the contest. Well, Macworld reports that this flaw had been made public in [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,13],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Last month, we reported about a Mac hack contest where a Mac was hacked in two minutes flat. Initial reports suggested that the security researcher,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-hack-vulnerability-had-been-public-for-months\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mac Hack Vulnerability Had Been Public for Months  - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Last month, we reported about a Mac hack contest where a Mac was hacked in two minutes flat. Initial reports suggested that the security researcher,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/mac-hack-vulnerability-had-been-public-for-months\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2008-04-23T08:28:59+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-hack-vulnerability-had-been-public-for-months\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-hack-vulnerability-had-been-public-for-months\/\",\"name\":\"Mac Hack Vulnerability Had Been Public for Months - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"datePublished\":\"2008-04-23T08:28:59+00:00\",\"dateModified\":\"2008-04-23T08:28:59+00:00\",\"description\":\"Last month, we reported about a Mac hack contest where a Mac was hacked in two minutes flat. Initial reports suggested that the security researcher,\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-hack-vulnerability-had-been-public-for-months\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/mac-hack-vulnerability-had-been-public-for-months\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-hack-vulnerability-had-been-public-for-months\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mac Hack Vulnerability Had Been Public for Months\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-hack-vulnerability-had-been-public-for-months\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-hack-vulnerability-had-been-public-for-months\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Mac Hack Vulnerability Had Been Public for Months\",\"datePublished\":\"2008-04-23T08:28:59+00:00\",\"dateModified\":\"2008-04-23T08:28:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/mac-hack-vulnerability-had-been-public-for-months\/#webpage\"},\"wordCount\":194,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"articleSection\":[\"Apple\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Last month, we reported about a Mac hack contest where a Mac was hacked in two minutes flat. Initial reports suggested that the security researcher,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/mac-hack-vulnerability-had-been-public-for-months\/","og_locale":"en_US","og_type":"article","og_title":"Mac Hack Vulnerability Had Been Public for Months  - The Mac Security Blog","og_description":"Last month, we reported about a Mac hack contest where a Mac was hacked in two minutes flat. Initial reports suggested that the security researcher,","og_url":"https:\/\/www.intego.com\/mac-security-blog\/mac-hack-vulnerability-had-been-public-for-months\/","og_site_name":"The Mac Security Blog","article_published_time":"2008-04-23T08:28:59+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-hack-vulnerability-had-been-public-for-months\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/mac-hack-vulnerability-had-been-public-for-months\/","name":"Mac Hack Vulnerability Had Been Public for Months - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"datePublished":"2008-04-23T08:28:59+00:00","dateModified":"2008-04-23T08:28:59+00:00","description":"Last month, we reported about a Mac hack contest where a Mac was hacked in two minutes flat. Initial reports suggested that the security researcher,","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-hack-vulnerability-had-been-public-for-months\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/mac-hack-vulnerability-had-been-public-for-months\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-hack-vulnerability-had-been-public-for-months\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Mac Hack Vulnerability Had Been Public for Months"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-hack-vulnerability-had-been-public-for-months\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-hack-vulnerability-had-been-public-for-months\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Mac Hack Vulnerability Had Been Public for Months","datePublished":"2008-04-23T08:28:59+00:00","dateModified":"2008-04-23T08:28:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/mac-hack-vulnerability-had-been-public-for-months\/#webpage"},"wordCount":194,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"articleSection":["Apple","Security &amp; Privacy"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-29","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/133"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/133\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=133"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=133"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}