ARDAgent

Whenever repairing disk permissions, this irritates me:

Warning: SUID file "System/Library/CoreServices/RemoteManagement/ARDAgent.app/Contents/MacOS/ARDAg ent" has been modified and will not be repaired.

Found this from 2009
http://support.apple.com/kb/TS1448

Now is 2011, ahem...

Found this scaring:
http://forums.macrumors.com/showthread.php?t=375608&page=4:

IMHO, there should be a way to get a verified good copy of this package directly from Apple, have it installed with the correct permissions that will pass Repair Disk Permissions with flying colors. Ignoring these kinds of messages is leading us down the path to MicroS**t levels of insecurity! Crying "paranoia" to those who show concern is compounding the potential for insecurity. Apple has a responsibility to resolve this.

Here's an example of how this could be VERY bad: You accidentally visit some nefarious web site by clicking on the wrong place in a google page with "ads" (probably you were clicking Save in a TextEdit document and Apple changed focus to S*fari which caused you to click on IloveRussianPorno - please Apple STOP changing focus on us!). The nefarious web site uses Javascript to install a new ARDA package which includes a trojan horse, giving all of Russia and China FULL REMOTE ACCESS to your computer. Some Bad Guy then watches your computer remotely, and when he notices some idle time he takes full control of your Mac, downloads your personal data (which, of course, you haven't encrypted and closed down because this is your "secure Macintosh"). Then he goes on a spending spree with your credit cards and checking accounts, and then he reformats your hard drive... or worse, leaves no trace and comes back occasionally to get more of your personal data.

Whats up, Apple?

MacBook Pro i7 17 2,8GHZ, Mac OS X (10.6.5), 8 GB RAM, 30 ACD

Posted on Feb 4, 2011 3:38 AM

Reply
2 replies

Feb 4, 2011 9:53 AM in response to Bikul

You are worrying over nothing. The claim that a JavaScript could blindly install a new package is totally bogus, and the person who posted that on the MacRumors forum was completely wrong (this is the danger of reading something posted on the Internet without verifying before you fly off the handle). The ARD agent is located in the core library which only the system root or an authorized administrator can alter.

It was dimly possible that someone could write a malicious AppleScript that could use the root access privileges (which is what the SUID change is about) to give a "bad guy" elevated permissions, but even if Apple has not fixed that possibility (which I believe they have) that cannot be done without a user with administrator privileges running the script. So unless you are in the habit of providing your administrator credentials to any web site that asks, or in downloading and running an application from any old site without knowing where the app came from, there's no way a "bad guy" could alter the ARD agent package in any way or use it to exploit your system.

Regards.

This thread has been closed by the system or the community team. You may vote for any posts you find helpful, or search the Community for additional answers.

ARDAgent

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.