First published: Thu Sep 20 2012(Updated: )
Apple Mac OS X before 10.7.5 and 10.8.x before 10.8.2 allows local users to read passwords entered into Login Window (aka LoginWindow) or Screen Saver Unlock by installing an input method that intercepts keystrokes.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
macOS Yosemite | <=10.7.4 | |
macOS Yosemite | =10.0 | |
macOS Yosemite | =10.0.0 | |
macOS Yosemite | =10.0.1 | |
macOS Yosemite | =10.0.2 | |
macOS Yosemite | =10.0.3 | |
macOS Yosemite | =10.0.4 | |
macOS Yosemite | =10.1 | |
macOS Yosemite | =10.1.0 | |
macOS Yosemite | =10.1.1 | |
macOS Yosemite | =10.1.2 | |
macOS Yosemite | =10.1.3 | |
macOS Yosemite | =10.1.4 | |
macOS Yosemite | =10.1.5 | |
macOS Yosemite | =10.2 | |
macOS Yosemite | =10.2.0 | |
macOS Yosemite | =10.2.1 | |
macOS Yosemite | =10.2.2 | |
macOS Yosemite | =10.2.3 | |
macOS Yosemite | =10.2.4 | |
macOS Yosemite | =10.2.5 | |
macOS Yosemite | =10.2.6 | |
macOS Yosemite | =10.2.7 | |
macOS Yosemite | =10.2.8 | |
macOS Yosemite | =10.3 | |
macOS Yosemite | =10.3.0 | |
macOS Yosemite | =10.3.1 | |
macOS Yosemite | =10.3.2 | |
macOS Yosemite | =10.3.3 | |
macOS Yosemite | =10.3.4 | |
macOS Yosemite | =10.3.5 | |
macOS Yosemite | =10.3.6 | |
macOS Yosemite | =10.3.7 | |
macOS Yosemite | =10.3.8 | |
macOS Yosemite | =10.3.9 | |
macOS Yosemite | =10.4 | |
macOS Yosemite | =10.4.0 | |
macOS Yosemite | =10.4.1 | |
macOS Yosemite | =10.4.2 | |
macOS Yosemite | =10.4.3 | |
macOS Yosemite | =10.4.4 | |
macOS Yosemite | =10.4.5 | |
macOS Yosemite | =10.4.6 | |
macOS Yosemite | =10.4.7 | |
macOS Yosemite | =10.4.8 | |
macOS Yosemite | =10.4.9 | |
macOS Yosemite | =10.4.10 | |
macOS Yosemite | =10.4.11 | |
macOS Yosemite | =10.5 | |
macOS Yosemite | =10.5.0 | |
macOS Yosemite | =10.5.1 | |
macOS Yosemite | =10.5.2 | |
macOS Yosemite | =10.5.3 | |
macOS Yosemite | =10.5.4 | |
macOS Yosemite | =10.5.5 | |
macOS Yosemite | =10.5.6 | |
macOS Yosemite | =10.5.7 | |
macOS Yosemite | =10.5.8 | |
macOS Yosemite | =10.6.0 | |
macOS Yosemite | =10.6.1 | |
macOS Yosemite | =10.6.2 | |
macOS Yosemite | =10.6.3 | |
macOS Yosemite | =10.6.4 | |
macOS Yosemite | =10.6.5 | |
macOS Yosemite | =10.6.6 | |
macOS Yosemite | =10.6.7 | |
macOS Yosemite | =10.6.8 | |
macOS Yosemite | =10.7.0 | |
macOS Yosemite | =10.7.1 | |
macOS Yosemite | =10.7.2 | |
macOS Yosemite | =10.7.3 | |
Apple Mac OS X Server | <=10.7.4 | |
Apple Mac OS X Server | =10.0 | |
Apple Mac OS X Server | =10.0.0 | |
Apple Mac OS X Server | =10.0.1 | |
Apple Mac OS X Server | =10.0.2 | |
Apple Mac OS X Server | =10.0.3 | |
Apple Mac OS X Server | =10.0.4 | |
Apple Mac OS X Server | =10.1 | |
Apple Mac OS X Server | =10.1.0 | |
Apple Mac OS X Server | =10.1.1 | |
Apple Mac OS X Server | =10.1.2 | |
Apple Mac OS X Server | =10.1.3 | |
Apple Mac OS X Server | =10.1.4 | |
Apple Mac OS X Server | =10.1.5 | |
Apple Mac OS X Server | =10.2 | |
Apple Mac OS X Server | =10.2.0 | |
Apple Mac OS X Server | =10.2.1 | |
Apple Mac OS X Server | =10.2.2 | |
Apple Mac OS X Server | =10.2.3 | |
Apple Mac OS X Server | =10.2.4 | |
Apple Mac OS X Server | =10.2.5 | |
Apple Mac OS X Server | =10.2.6 | |
Apple Mac OS X Server | =10.2.7 | |
Apple Mac OS X Server | =10.2.8 | |
Apple Mac OS X Server | =10.3 | |
Apple Mac OS X Server | =10.3.0 | |
Apple Mac OS X Server | =10.3.1 | |
Apple Mac OS X Server | =10.3.2 | |
Apple Mac OS X Server | =10.3.3 | |
Apple Mac OS X Server | =10.3.4 | |
Apple Mac OS X Server | =10.3.5 | |
Apple Mac OS X Server | =10.3.6 | |
Apple Mac OS X Server | =10.3.7 | |
Apple Mac OS X Server | =10.3.8 | |
Apple Mac OS X Server | =10.3.9 | |
Apple Mac OS X Server | =10.4 | |
Apple Mac OS X Server | =10.4.0 | |
Apple Mac OS X Server | =10.4.1 | |
Apple Mac OS X Server | =10.4.2 | |
Apple Mac OS X Server | =10.4.3 | |
Apple Mac OS X Server | =10.4.4 | |
Apple Mac OS X Server | =10.4.5 | |
Apple Mac OS X Server | =10.4.6 | |
Apple Mac OS X Server | =10.4.7 | |
Apple Mac OS X Server | =10.4.8 | |
Apple Mac OS X Server | =10.4.9 | |
Apple Mac OS X Server | =10.4.10 | |
Apple Mac OS X Server | =10.4.11 | |
Apple Mac OS X Server | =10.5 | |
Apple Mac OS X Server | =10.5.0 | |
Apple Mac OS X Server | =10.5.1 | |
Apple Mac OS X Server | =10.5.2 | |
Apple Mac OS X Server | =10.5.3 | |
Apple Mac OS X Server | =10.5.4 | |
Apple Mac OS X Server | =10.5.5 | |
Apple Mac OS X Server | =10.5.6 | |
Apple Mac OS X Server | =10.5.7 | |
Apple Mac OS X Server | =10.5.8 | |
Apple Mac OS X Server | =10.6.0 | |
Apple Mac OS X Server | =10.6.1 | |
Apple Mac OS X Server | =10.6.2 | |
Apple Mac OS X Server | =10.6.3 | |
Apple Mac OS X Server | =10.6.4 | |
Apple Mac OS X Server | =10.6.5 | |
Apple Mac OS X Server | =10.6.6 | |
Apple Mac OS X Server | =10.6.7 | |
Apple Mac OS X Server | =10.6.8 | |
Apple Mac OS X Server | =10.7.0 | |
Apple Mac OS X Server | =10.7.1 | |
Apple Mac OS X Server | =10.7.2 | |
Apple Mac OS X Server | =10.7.3 | |
macOS Yosemite | =10.8.0 | |
macOS Yosemite | =10.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3718 has been rated as a medium severity vulnerability due to its potential for password exposure.
To fix CVE-2012-3718, users should update their Mac OS X to version 10.7.5 or later for non-server systems and 10.8.2 or later for server systems.
CVE-2012-3718 affects all versions of Apple Mac OS X prior to 10.7.5 and 10.8.x earlier than 10.8.2.
CVE-2012-3718 allows local users to intercept and read passwords entered into the Login Window or Screen Saver Unlock.
Currently, the best workaround for CVE-2012-3718 is to ensure that no untrusted input methods are installed on affected systems.