About the security content of Security Update 2017-001

This document describes the security content of Security Update 2017-001.

About Apple security updates

For our customers' protection, Apple doesn't disclose, discuss, or confirm security issues until an investigation has occurred and patches or releases are available. Recent releases are listed on the Apple security updates page.

For more information about security, see the Apple Product Security page. You can encrypt communications with Apple using the Apple Product Security PGP Key.

Apple security documents reference vulnerabilities by CVE-ID when possible.

Security Update 2017-001

Released November 29, 2017

Directory Utility

Available for: macOS High Sierra 10.13 and macOS High Sierra 10.13.1

Not impacted: macOS Sierra 10.12.6 and earlier

Impact: An attacker may be able to bypass administrator authentication without supplying the administrator’s password

Description: A logic error existed in the validation of credentials. This was addressed with improved credential validation.

CVE-2017-13872

Entry updated November 29, 2017

If you recently updated from macOS High Sierra 10.13 to 10.13.1, reboot your Mac to make sure the Security Update is applied properly. Or if you see MRTConfigData 1.27 in the Installations list under Software in System Report, your Mac is also protected.

To confirm that your Mac has Security Update 2017-001:

  1. Open the Terminal app, which is in the Utilities folder of your Applications folder.

  2. Type what /usr/libexec/opendirectoryd and press Return.

  3. If Security Update 2017-001 was installed successfully, you will see one of these project version numbers:

    • opendirectoryd-483.1.5 on macOS High Sierra 10.13

    • opendirectoryd-483.20.7 on macOS High Sierra 10.13.1

If you require the root user account on your Mac, you will need to re-enable the root user and change the root user's password after this update.

Information about products not manufactured by Apple, or independent websites not controlled or tested by Apple, is provided without recommendation or endorsement. Apple assumes no responsibility with regard to the selection, performance, or use of third-party websites or products. Apple makes no representations regarding third-party website accuracy or reliability. Contact the vendor for additional information.

Published Date: