Interesting mix of responses. At one point I was worried the naysayers was getting the upper hand, but I am glad more rational voices have prevailed; whereas responses from people like BRLawyer may seem funny, it reflects badly on the Mac community, and the reason why some consider Mac users snobs or unquestioning acolytes.
To the likes of BRLawyer, I say: Don't forget it was on these very furums that the very first Worm was unleashed, not a mere proof of concept like previously, but an actual exploit. And also of Safari. Thankfully it was not very destructive and OSX security did mostly protect the system itself. But a user's personal files are what a user values most.
As has been expressed well by others, it was a legitimate scenario of a user visiting a compromised webpage. The difference between day one and two was user interaction: Initially hackers were unable to gain access remotely
on the Macs running a stock OSX setup with the default security settings and no 3rd party apps running.
The second day allowed people from anywhere on the Internet to email a link to a compromised web page to be opened in Safari.
I haven't seen this mentioned here:
2 Macs were up for grabs: A 15" MacBook Pro and a 17". The first one required Default User-level access, the second one required Root access. Instructions for claiming the prize was in the Default user's Home directory one the 15", and in Root on the second 17".
It was the first one that got "owned"; in other words, through the Safari flaw, they gained external terminal access as the Default User, not as Root. The second one has not been claimed. Whereas gaining User access is very bad and is the first step in Privilege Elevation, it is still worth noting that they were not able to get Root on the 2nd 17" machine, or surely they would have done so rather than claiming the easier prize.
Claiming the 2nd is made harder by the fact that the same exploit is not allowed.
Whether this means there are no currently-known unpatched privilege-elevating exploits, or the hackers in question simply weren't up to it in the time allowed, I don't know; the guy who previously gave people local access on his Mac Mini and challenged people to get Root and consequently got "owned", shows it is possibly, or at least was at the time.
An interesting thing was mentioned that people can get Webkit nightlies and check for any vulnerabilities being patched, and then apply it to the wild before any official patches are issued. This is an interesting example of Opensource being used against itself.
WebKit/Safari is an obvious mode of attack, since just as Internet Explorer is such a major security risk because it is so deeply embedded in the System, so is WebKit, though I don't know that Apple has blundered quite as badly as Microsoft did.