Once we logged in into new user profile after reboot, printer spooler get started and printer worked perfectly fine.There is no more error 0x800706b9 in Print spooler, it has resolved. If your print spooler works on new account that means it should be worked on your old user account as well."But as soon as you update [to 10.13.1], it comes back again and no one knows it."Even if a Mac user knew to reinstall the security patch after they upgraded High Sierra—and in fact, Apple would eventually install that update automatically, as it has for other users affected by the "root" bug—they could still be left vulnerable, says Thomas Reed, an Apple-focused researcher at security firm Malware Bytes.After Reed confirmed that 10.13.1 reopened the "root" bug, he again installed Apple's security fix for the problem.But he found that, until he rebooted, he could even then type "root" without a password to entirely bypass High Sierra's security protections."I installed the update again from the App Store, and verified that I could still trigger the bug. "Anyone who hasn't yet updated to 10.13.1, they’re now in the pipeline headed straight for this issue."Mac administrator Chris Franson, a technical director at Northeastern University, tells WIRED that he repeated that sequence of events and found that the "root" bug persisted, too.But he noted that rebooting the computer—after updating to 10.13.1 and then re-installing the security fix—did cause the security update to finally kick in and resolve the issue, which Malware Bytes' Reed confirmed.Apple's initial patch came out about a 18 hours after the bug was first reported.But now multiple Mac users have confirmed to WIRED that Apple's fix for that problem has a serious glitch of its own.
Even among those who were affected, many likely have rebooted their computers, which should leave them protected.
But the shoddiness of Apple's patch joins a disturbing pattern of security missteps in High Sierra's code.
Apple had already issued a rare apology for the "root" security flaw, writing that its "customers deserve better" and promising to audit its development practices to prevent similar bugs in the future.
Those who had not yet upgraded their operating system from the original version of High Sierra, 10.13.0, to the most recent version, 10.13.1, but had downloaded the patch, say the "root" bug reappears when they install the most recent mac OS system update.
And worse, two of those Mac users say they've also tried re-installing Apple's security patch after that upgrade, only to find that the "root" problem persists until they reboot their computer, with no warning that a reboot is necessary."It’s really serious, because everyone said 'hey, Apple made a very fast update to this problem, hooray,'" says Volker Chartier, a software engineer at German energy firm Innogy who was the first to alert WIRED to the issue with Apple's patch.
We found lots of PUP (potentially unwanted programs) installed on his computer.