Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

New (local) Mac OS X vulnerability : Passwords in Swap files

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » The DU Lounge Donate to DU
 
Nomad559 Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jun-27-04 11:25 PM
Original message
New (local) Mac OS X vulnerability : Passwords in Swap files
http://www.macdevcenter.com/pub/wlg/5125

Apparently, swap files in Mac OS X (as of 10.3.4) contain user passwords in clear text.

Run the following on your Mac OS X box to see if you can find your passwords stored in clear text: sudo strings -8 /var/vm/swapfile0 |grep -A 4 -i longname

At first, this 'vulnerability' may not seem like such a big deal. After all, the swap files are only readable by root. However, a system administrator should not have it so easy if he or she would want to obtain user passwords. Passwords should never be stored in clear text _anywhere_. A malicious trojan with root privileges can now steal user password in clear text, and many users use same passwords for other accounts, so this is a big deal. In addition, Keychain passwords are also apparently stored in clear text within the swap files
Printer Friendly | Permalink |  | Top
benburch Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jun-27-04 11:28 PM
Response to Original message
1. I don't think this is a big deal...
First, nobody but the owner ever uses most OSX systems.

Second, it is easy for Apple to fix, and no doubt they will soon.

Third, the same issue exists in Linux, and nobody seems to be worried about that.
Printer Friendly | Permalink |  | Top
 
Renew Deal Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jun-27-04 11:31 PM
Response to Reply #1
3. Nobody but the owner?
Does that include employees who aren't the owners and kiosk machines? What about running a script that uploads the swap file up to some ftp server? There are ways to take advantage of this.

Also, why would Apple fix this if it is standard in Linux? And you are saying that Linux says passwords in clear text in the swap file? That's hard to believe.
Printer Friendly | Permalink |  | Top
 
benburch Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jun-27-04 11:35 PM
Response to Reply #3
4. In Linux...
There is a "device" called /dev/ram that somebody with root privs can read and which is an image of all of the contents of memory. Including whatever password you just typed in.
Printer Friendly | Permalink |  | Top
 
Renew Deal Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Jun-27-04 11:28 PM
Response to Original message
2. That's really bad.
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Fri Apr 26th 2024, 10:39 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » The DU Lounge Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC