OS X flaw exposes passwords in plain text

Last updated 11:31 08/05/2012

Relevant offers

Digital Living

How to make 360 videos and photos Why do grown adults subject their Facebook contacts to 'friendship tests'? With my laptop, it's personal Wired debuts ad-free website to appease ad blockers Fitbit knows woman is pregnant - before she does India says no to Facebook's "free" internet for the poor A phone with 7-day battery life planned by fuel-cell maker Internet advice site answers with GIFs Lawyers circling Apple's 'error 53' iPhone killer Waikato University student classifies cyber attacks with Interpol

This post was originally published on Mashable.

An Apple programmer has accidentally left a debug flag in the most recent version of OS X Lion, which under certain conditions can cause login passwords to appear in a plain text debug log file.

The flaw affects users who have used Apple's encryption software FileVault prior to upgrading to 10.7.3, while FileVault 2 is unaffected.

To make matters worse, Apple has not issued a fix for the matter, so changing your user credentials right now does not help, as those credentials might end up in a debug log file as well.

The flaw, which was originally spotted by a security researcher David Emery, potentially enables anyone with an admin password to retrieve other user's credentials.

"This is worse than it seems, since the log in question can also be read by booting the machine into firewire disk mode and reading it by opening the drive as a disk or by booting the new-with-LION recovery partition and using the available superuser shell to mount the main file system partition and read the file. This would allow someone to break into encrypted partitions on machines they did not have any idea of any login passwords for," claims Emery.

Mashable is the largest independent news source covering digital culture, social media and technology.

Ad Feedback

Comments

Special offers

Featured Promotions

Sponsored Content