|Secunia||Apple Mac OS X FileVault Plain Text Password Logging Security Issue|
|10th May, 2012 11:37|
User Since: -
System Score: -
Location: Copenhagen, DK
A security issue has been reported in Apple Mac OS X, which can be exploited by malicious people with physical access to bypass certain security restrictions.
The security issue is caused due to the debug switch being enabled within FileVault when using "Legacy FileVault". This may lead to users' password being saved in DEBUGLOG in plain text and can be exploited to read the password via FireWire target disk mode.
Successful exploitation requires that OS X is upgraded from an older version and uses the "Legacy FileVault" feature.
The security issue is reported in version 10.7.3.
|RE: Apple Mac OS X FileVault Plain Text Password Logging Security Issue||
|This reply has been minimised due to a negative Relevancy Score.|
|ddmarshall||RE: Apple Mac OS X FileVault Plain Text Password Logging Security Issue|
|10th May, 2012 19:05|
User Since: 8th Nov 2008
System Score: 100%
|They are all the CVEs fixed in 10.7.4.
The FileVault problem is CVE-2012-0652
This answer is provided “as-is.” You bear the risk of using it.
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.