Mac OS X Lion password flaws let hackers lock you out

Catch up with NBC News Clone on today's hot topic: Wbna44599601 - Breaking News | NBC News Clone. Our editorial team reformatted this story for clarity and speed.

Two serious security flaws exist in Apple's recently released Mac OS X 10.7 Lion, the worse of which allows an attacker to change a user's administrative password without first knowing the target's original password.

SHARE THIS —

Two serious security flaws exist in Apple's recently released Mac OS X 10.7 Lion, the worse of which allows an attacker to change a user's administrative password without first knowing the target's original password.

Reported on the security blog Defence in Depth, the bugs enable non-administrative users of a computer running Lion — including users who've been given remote access — to change the victim's password without first verifying that they are, in fact, the legitimate owner of the computer.

In previous versions of Mac OS X, such as Snow Leopard, the only way to change the administrative password was to first enter the current one. That's no longer necessary. The security slip-up could have serious consequences, as it would effectively give an attacker privileged, unauthorized access to another person's computer — and freeze out the real owner.

"It appears in the redesign of OS X Lion's authentication scheme a critical step has been overlooked," Defence in Depth's Patrick Dunstan wrote.

Another Lion flaw discovered by Dunstan enables a skilled hacker to view the computer's password hash data by extracting it from the Directory Services file.

(Password hashes are the results of running passwords through encryption algorithms. Those algorithms are supposedly unbreakable, but in truth, automated password-cracking software can run through the millions of possible results from a fixed algorithm to "brute force" the passwords into plain text).

It's important to note that these password attacks don't yet allow a victim's computer to be exploited by far-off strangers; the hacker must have either physical access to the target system, or have been granted remote limited-user access to it.

But in the seconds it would take to perform these password takeovers, Defence in Depth says a physical attacker could also visit a Web page rigged with malicious code that would then connect a remote attacker to the compromised machine. From there, the possibilities for exploitation are endless.

To stay safe, make sure you use a very strong password, and never leave your Mac unattended and logged in anywhere with public Wi-Fi, where the person sipping a latte next to you might waiting to pounce.

×
AdBlock Detected!
Please disable it to support our content.

Related Articles

Donald Trump Presidency Updates - Politics and Government | NBC News Clone | Inflation Rates 2025 Analysis - Business and Economy | NBC News Clone | Latest Vaccine Developments - Health and Medicine | NBC News Clone | Ukraine Russia Conflict Updates - World News | NBC News Clone | Openai Chatgpt News - Technology and Innovation | NBC News Clone | 2024 Paris Games Highlights - Sports and Recreation | NBC News Clone | Extreme Weather Events - Weather and Climate | NBC News Clone | Hollywood Updates - Entertainment and Celebrity | NBC News Clone | Government Transparency - Investigations and Analysis | NBC News Clone | Community Stories - Local News and Communities | NBC News Clone