First published: Mon Jun 02 2008(Updated: )
The sso_util program in Single Sign-On in Apple Mac OS X before 10.5.3 places passwords on the command line, which allows local users to obtain sensitive information by listing the process.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mac OS X Server | =10.5.2 | |
Apple Mac OS X Server | =10.4.11 | |
macOS Yosemite | =10.5.1 | |
Apple Mac OS X Server | =10.5.1 | |
macOS Yosemite | =10.5 | |
macOS Yosemite | =10.5.2 | |
macOS Yosemite | =10.4.11 | |
Apple Mac OS X Server | =10.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1578 is classified as a high-severity vulnerability due to the exposure of sensitive information through command-line arguments.
To mitigate CVE-2008-1578, upgrade your system to Apple Mac OS X 10.5.3 or later where the vulnerability has been addressed.
CVE-2008-1578 affects users of Apple Mac OS X versions 10.4.11 and 10.5.1 through 10.5.2.
CVE-2008-1578 allows local users to gain access to sensitive passwords, potentially compromising account security.
CVE-2008-1578 is not a risk for current macOS systems since the vulnerability was resolved in OS X 10.5.3.