Forum Thread: Apple Mac OS X FileVault Plain Text Password Logging Security Issue

You are currently viewing a forum thread in the Secunia Community Forum. Please note that opinions expressed here are not of Secunia but solely reflect those of the user who wrote it.

This thread was submitted in the following forum:
Vulnerabilities

See the original Secunia advisory:
Apple Mac OS X FileVault Plain Text Password Logging Security Issue

Secunia Apple Mac OS X FileVault Plain Text Password Logging Security Issue
Secunia Official 10th May, 2012 11:37
Ranking: 0
Posts: 0
User Since: -
System Score: -
Location: Copenhagen, DK
A security issue has been reported in Apple Mac OS X, which can be exploited by malicious people with physical access to bypass certain security restrictions.

The security issue is caused due to the debug switch being enabled within FileVault when using "Legacy FileVault". This may lead to users' password being saved in DEBUGLOG in plain text and can be exploited to read the password via FireWire target disk mode.

Successful exploitation requires that OS X is upgraded from an older version and uses the "Legacy FileVault" feature.

The security issue is reported in version 10.7.3.

Lanan_Makz

RE: Apple Mac OS X FileVault Plain Text Password Logging Security Issue
[+]
This reply has been minimised due to a negative Relevancy Score.
ddmarshall RE: Apple Mac OS X FileVault Plain Text Password Logging Security Issue
Dedicated Contributor 10th May, 2012 19:05
Score: 1232
Posts: 978
User Since: 8th Nov 2008
System Score: 98%
Location: UK
They are all the CVEs fixed in 10.7.4.
http://support.apple.com/kb/HT5281

The FileVault problem is CVE-2012-0652

--
This answer is provided “as-is.” You bear the risk of using it.
Was this reply relevant?
+0
-0