SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   OS (UNIX)  >   Mac OS X Vendors:   Apple Computer
Mac OS X Single Sign-On Discloses Passwords to Local Users
SecurityTracker Alert ID:  1020142
SecurityTracker URL:  http://securitytracker.com/id/1020142
CVE Reference:   CVE-2008-1578   (Links to External Site)
Date:  May 29 2008
Impact:   Disclosure of authentication information, Root access via local system, User access via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Mac OS X Single Sign-On. A local user can obtain passwords.

Passwords are supplied to the sso_util command-line tool as command line arguments. A local user can potentially view the passwords and then gain elevated privileges.

This includes user passwords, administrator passwords, and the KDC administration password.

Geoff Franks of Hauptman Woodward Institute reported this vulnerability.

Impact:   A local user can obtain passwords.
Solution:   The vendor has issued a fix as part of Security Update 2008-003 and Mac OS X v10.5.3, available from the Software Update pane in System Preferences, or Apple's Software Downloads web site at:

http://www.apple.com/support/downloads/

The Software Update utility will present the update that applies to your system configuration. Only one is needed, either Security Update 2008-003 or Mac OS X v10.5.3.

For Mac OS X v10.5.2
The download file is named: "MacOSXUpd10.5.3.dmg"
Its SHA-1 digest is: 017ef905e5653b04e2455da261e804a72bf40139

For Mac OS X v10.5 - v10.5.1
The download file is named: "MacOSXUpdCombo10.5.3.dmg"
Its SHA-1 digest is: 69acd7399de25f1548675d660fdf24eb401e3de3

For Mac OS X Server v10.5.2
The download file is named: "MacOSXServerUpd10.5.3.dmg"
Its SHA-1 digest is: 336c9dceca724eab0b8c9db3943be3f9ecf244a4

For Mac OS X Server v10.5 - v10.5.1
The download file is named: "MacOSXServerUpdCombo10.5.3.dmg"
Its SHA-1 digest is: fdb2187d19ce21caecd3c3ba6b6fa6f65c9c3a4f

For Mac OS X v10.4.11 (Intel)
The download file is named: "SecUpd2008-003Intel.dmg"
Its SHA-1 digest is: 8f84d2f757c2fb277b139f72ef501dc894620e97

For Mac OS X v10.4.11 (PowerPC)
The download file is named: "SecUpd2008-003PPC.dmg"
Its SHA-1 digest is: 51e98d988c5bb09d4b1052199d90a9d65af7c8e7

For Mac OS X Server v10.4.11 (Universal)
The download file is named: "SecUpdSrvr2008-003Univ.dmg"
Its SHA-1 digest is: 337a05956b5a6e962b286a91beee9eb217a0175c

For Mac OS X Server v10.4.11 (PowerPC)
The download file is named: "SecUpdSrvr2008-003PPC.dmg"
Its SHA-1 digest is: 94cab2b4e5d26a284c5d91d0fe4dc20b4e9cfc97

The vendor's advisory is available at:

http://support.apple.com/kb/HT1897

Vendor URL:  support.apple.com/kb/HT1897 (Links to External Site)
Cause:   Access control error
Underlying OS:  

Message History:   None.


 Source Message Contents

Date:  Wed, 28 May 2008 15:59:23 -0700
Subject:  APPLE-SA-2008-05-28 Security Update 2008-003 and Mac OS X v10.5.3

Single Sign-On
CVE-ID:  CVE-2008-1578
Available for:  Mac OS X v10.4.11, Mac OS X Server v10.4.11,
Mac OS X v10.5 through v10.5.2, Mac OS X Server v10.5 through v10.5.2
Impact:  Passwords supplied to sso_util are exposed to other local
users
Description:  The sso_util command-line tool required that passwords
be passed to it in its arguments, potentially exposing the passwords
to other local users. Passwords exposed include those for users,
administrators, and the KDC administration password. This update
makes the password parameter optional, and sso_util will prompt for
the password if needed. Credit to Geoff Franks of Hauptman Woodward
Institute for reporting this issue.
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC