Re: nidump on OS X

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Disabling nidump wouldn't help, as this is NetInfo being a little too
generous.  You can also use, for example, niutil:

niutil -read . /users/root

You'll note nidump isn't setid-anything, so someone can simply copy it
from another machine.

Bryan


On Sep 15, 2002 14:28, Dale Harris stated:
> Basically any normal user can get a dump of the passwd file and attempt 
> brute force attacks on the encrypted passwds, it includes the root passwd.
> 
> This problem has been around for well over a year, but Apple ignores it:
> 
> http://www.securitytracker.com/alerts/2001/Jul/1001946.html
> http://online.securityfocus.com/archive/1/211718
> 
> However Apple hasn't seemed to bother addressing it yet since it still persists
> in OS X.2 (Jaguar).  You'd think they might have taken the opportunity to fix
> this problem with a new major release.
> 
> This obviously isn't such a big problem when you are dealing with only
> limited access desktop systems, but Xserve exists now, and I would think
> it'd be a bigger concern.  Course you could always chmod 700 nidump.
> 
> -- 
> Dale Harris   
> rodmur@maybe.org
> /.-)
> 

[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux