First published: Mon Dec 31 2001(Updated: )
Point to Point Protocol daemon (pppd) in MacOS x 10.0 and 10.1 through 10.1.5 provides the username and password on the command line, which allows local users to obtain authentication information via the ps command.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
macOS Yosemite | =10.1 | |
macOS Yosemite | =10.1.4 | |
macOS Yosemite | =10.0 | |
macOS Yosemite | =10.1.3 | |
macOS Yosemite | =10.1.5 | |
macOS Yosemite | =10.1.1 | |
macOS Yosemite | =10.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2001-1565 is considered moderate due to the exposure of sensitive authentication information.
To mitigate CVE-2001-1565, upgrade to a version of MacOS that is not vulnerable, focusing on versions beyond 10.1.5.
CVE-2001-1565 affects users running MacOS X versions 10.0 and 10.1 through 10.1.5.
CVE-2001-1565 allows local users to view sensitive username and password information, presenting a risk of unauthorized access.
CVE-2001-1565 is a local vulnerability, meaning it can be exploited by users with physical or local access to the affected system.