Vulnerabilities / Threats
7/29/2011
01:26 PM
50%
50%

Mac OS X Lion Password Vulnerability: Sleep Mode

Forensic software can exploit a seven-year-old FireWire design error to snoop system memory for passwords, even for devices that are locked or in sleep mode.

Updated forensic software can steal Apple OS X login passwords in minutes, even when the devices are locked or asleep.

To be successful, however, users of the software, Passware Kit Forensic v11, must have physical access to the target Mac device, as well as a FireWire cable connection. At that point, the software can capture the password data from the Mac's memory, even on the latest version of Apple's operating system, Mac OS X Lion.

According to Passware, its $995 software kit only takes a few minutes to work. It also functions regardless of password strength, and even if FileVault encryption has been activated. Passware previously implemented the same technique to decrypt Windows hard disks encrypted with BitLocker and TrueCrypt, with software running on a USB key that is plugged into the target machine.

Interestingly, the "potential vulnerability"--as Passware described it--in Apple OS X that enables password extraction is in many ways also a documented FireWire feature. "One of the design features of FireWire, and part of what makes it attractive for professional use, is that it allows for [direct memory access], a technology used in modern computers which allows peripherals to bypass the CPU and directly read from and write to memory," said Aryeh Goretsky, a distinguished researcher at ESET, in a blog post. "Because the processor does not have to manage the data transfer, higher data rates, and lower CPU utilization can be ensured, while leaving the CPU available to perform other functions."

Security researchers first identified the underlying "FireWire design error" in 2004, he said, though it was largely ignored until an "authentication bypass attack on Windows XP and (with some modification) the then-new Windows Vista operating system," emerged in 2008.

Stealing passwords isn't all that's possible via FireWire. In February 2011, for example, "computer security firm HBGary partnered with defense contractor General Dynamics on a project named 'Task B' to install rootkits onto computers by writing them directly into a computer's memory," he said, referencing an Ars Technica story.

As a data transfer technology, FireWire has already been well eclipsed by the less expensive USB 2.0. Many Apple devices--including the MacBook and MacBook Air--now ship with no FireWire port. In fact, Apple is now putting its weight behind Thunderbolt, a connection technology that offers roughly twice the speed of USB 3.0, and 12 times the speed of FireWire 800.

For Apple computers that do have a FireWire port, and owners who fear their machines will be hacked via forensic software and an attacker who has the required physical access to the machine, here's an easy mitigation strategy: always turn off the computer instead of putting it to sleep, and deactivate the "automatic login" setting, which will prevent the computer from fully booting until a password has been entered. "This way, passwords will not be present in memory and cannot be recovered," according to Passware. Such a log-in password will already be required for any users who have activated Lion's built-in whole-disk encryption feature, FileVault 2.

Another mitigation strategy is to disable FireWire, if you have no devices that use the port, said Goretsky. "Or, even more simply, don't leave your computer alone in an unsafe location. While the chance of a password theft or rootkit injection via FireWire is likely quite low, there's a much higher probability of its being stolen the old-fashioned way."

In other Apple-related forensic software update news, on Monday, Russian forensic software maker Elcomsoft announced that its iOS Forensic Toolkit has been updated to support Windows, and includes the ability to decrypt keychain data--used to store sensitive information--for all devices running iOS 3.x, and most that run iOS 4.x, using brute-force recovery if necessary.

The iOS Forensic Toolkit can also be used to obtain an image of an iPhone, iPad, or iPod Touch device--provided the software's user has physical access to the device--and decrypt these images. As a result, it "allows one to obtain a fully usable image of the device's file system with the contents of each and every file decrypted and available for analysis," said Andrey Belenko a security researcher at Elcomsoft, in a blog post.

The update also allows for "logging of all activities occurring while the toolkit is running," he said, which was a feature requested by multiple law enforcement agency users.

Security concerns give many companies pause as they consider migrating portions of their IT operations to cloud-based services. But you can stay safe in the cloud. In this Dark Reading Tech Center report, we explain the risks and guide you in setting appropriate cloud security policies, processes and controls. Read our report now. (Free registration required.)

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5395
Published: 2014-11-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Huawei HiLink E3276 and E3236 TCPU before V200R002B470D13SP00C00 and WebUI before V100R007B100D03SP01C03, E5180s-22 before 21.270.21.00.00, and E586Bs-2 before 21.322.10.00.889 allow remote attackers to hijack the authentication of users ...

CVE-2014-7137
Published: 2014-11-21
Multiple SQL injection vulnerabilities in Dolibarr ERP/CRM before 3.6.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) contactid parameter in an addcontact action, (2) ligne parameter in a swapstatut action, or (3) project_ref parameter to projet/tasks/contact.php; (4...

CVE-2014-7871
Published: 2014-11-21
SQL injection vulnerability in Open-Xchange (OX) AppSuite before 7.4.2-rev36 and 7.6.x before 7.6.0-rev23 allows remote authenticated users to execute arbitrary SQL commands via a crafted jslob API call.

CVE-2014-8090
Published: 2014-11-21
The REXML parser in Ruby 1.9.x before 1.9.3 patchlevel 551, 2.0.x before 2.0.0 patchlevel 598, and 2.1.x before 2.1.5 allows remote attackers to cause a denial of service (CPU and memory consumption) a crafted XML document containing an empty string in an entity that is used in a large number of nes...

CVE-2014-8469
Published: 2014-11-21
Cross-site scripting (XSS) vulnerability in Guests/Boots in AdminCP in Moxi9 PHPFox before 4 Beta allows remote attackers to inject arbitrary web script or HTML via the User-Agent header.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?