Mac OS X 10.7.3 Lion login passwords exposed


The Mac OS X Lion 10.7.3 update turns on a system-wide debug log file which contains the login passwords of every user who has logged in since this update was applied. You are only vulnerable if you upgraded to Lion and kept your folders encrypted using FileVault 1. If you use FileVault 2, you will not be affected by this vulnerability. So what does this mean for Mac users? Simply, if your Mac is stolen or someone gains physical access, they will have full access to your system including encrypted files.

The debug log file is only kept by default for several weeks, which means if you installed this update some three months ago, your login credentials will not exist. This vulnerability allows users to access encrypted files and every file that requires your credentials. It also allows someone to read your Time Machine security key, as your login password is stored in the backed-up log file in clear text. Hashes anyone? Read more...

May 11, 2012
Notify of

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023