Mac OS X Lion password-changing flaw uncovered
Changing passwords looks awfully simple for anyone who has acquired access to a Mac OS X Lion machine.
A flaw in Apple's new OS lets those with access to a Mac running Lion change passwords without knowing the user's login details, a researcher has claimed.
In previous versions of the Apple OS, users wanting to change passwords had to enter their login information before making alterations.
Why crack hashes when you can just change the password directly?
Now that step is not needed, thanks to insecure permissions in the Mac OS X Lion's local directory service, researcher Patrick Dunstan said, writing on the Defense in Depth blog.
"Why crack hashes when you can just change the password directly?" Dunstan said. "It appears Directory Services in Lion no longer requires authentication when requesting a password change for the current user."
Dunstan also claimed it was possible to access other users' password hashes and therefore steal their login information.
In previous versions of Mac OS X, only those with root access were allowed to view so-called shadow files, which contain hashes and salts used to encrypt passwords.
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Although non-root users cannot access the shadow file directly, they can still gain access to information in it by extracting data from the directory services on the OS. All that needs to be done is type in the right command into Terminal to get that information, the researcher claimed.
"The interesting thing about this? Root privileges are not required," Dunstan added. "All users on the system, regardless of privilege, have the ability to access the ShadowHashData attribute from any other user's profile."
A brute force attack could be used to crack passwords once the hash and salt are acquired.
Comments on the blog showed some claiming to have exploited the flaw successfully, whilst others were unable to do so.
At the time of publication, Apple had not responded to a request for comment on the alleged vulnerability.
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
TPUs: Google's home advantageITPro Podcast How does TPU v7 stack up against Nvidia's latest chips – and can Google scale AI using only its own supply?
-
Microsoft Excel is still alive and kicking at 40News A recent survey found Gen Z and Millennial finance professionals have a strong “emotional attachment” to Microsoft Excel
-
Security experts claim the CVE Program isn’t up to scratch anymore — inaccurate scores and lengthy delays mean the system needs updatedNews CVE data is vital in combating emerging threats, yet inaccurate ratings and lengthy wait times are placing enterprises at risk
-
IBM AIX users urged to patch immediately as researchers sound alarm on critical flawsNews Network administrators should patch the four IBM AIX flaws as soon as possible
-
Critical Dell Storage Manager flaws could let hackers access sensitive data – patch nowNews A trio of flaws in Dell Storage Manager has prompted a customer alert
-
Thousands of exposed civil servant passwords are up for grabs onlineNews While the password security failures are concerning, they pale in comparison to other nations
-
Gen Z has a cyber hygiene problemNews A new survey shows Gen Z is far less concerned about cybersecurity than older generations
-
Flaw in Lenovo’s customer service AI chatbot could let hackers run malicious code, breach networksNews Hackers abusing the Lenovo flaw could inject malicious code with just a single prompt
-
Passwords are a problem: why device-bound passkeys can be the future of secure authenticationIndustry insights AI-driven cyberthreats demand a passwordless future…
-
LastPass just launched a tool to help security teams keep tabs on shadow IT risksNews Companies need to know what apps their employees are using, so LastPass made a browser extension to help
