lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <900AFDB0-6353-41FB-83C0-B631250F480A@rescomp.stanford.edu>
Date: Wed, 16 May 2007 12:21:12 -0700
From: Ian Ward Comfort <icomfort@...comp.stanford.edu>
To: bugtraq@...urityfocus.com
Subject: Re: Apple Safari on MacOSX may reveal user's saved passwords

On May 16, 2007, at 10:42 AM, graham.coles@...-logic-group.com wrote:
> I too appear to be having difficulty relating this to a vulnerability.

Fair enough...

>>  It works for:
>>  the same user using ssh as is on the console;
>
> If someone can remotely log in as you over ssh then they already  
> have your
> password (or worse, certificate!), so why would they try to obtain  
> it from
> a browser?
>
> They already have total access to all your files, there would  
> appear to be
> nothing more to gain from this.

... but note that reading web passwords from Safari does give someone  
*more* than "total access to all your files", since the keychain in  
which those passwords are stored is encrypted on disk.

>>  the root user using ssh (or someone who can sudo) can inject
>>  Javascript into the console user's browser;
>
> Are you even considering what you are saying?
>
> Someone has *ROOT* access to your system REMOTELY over ssh and you're
> worried that they might be able to retrieve a password from your  
> keychain.
> By this stage, your entire system and every file in it is pretty much
> owned.

Again, owning the file is not quite as good as owning the web  
passwords, since the file is encrypted, usually with the user's login  
password (if we're talking about the login keychain) but not always.   
The harm here, as I see it, is that if you have Safari open and have  
unlocked a keychain for it, with some valuable passwords (say for  
financial institutions), someone who can execute arbitrary code as  
your user can read passwords from that keychain that they couldn't  
read from the keychain as stored on disk.

I'm not sure if making Safari dump core would also reveal these  
passwords; if so that would make this issue more or less moot.  And  
of course as root one can presumably read the passwords out of system  
memory.  But this behavior seems to make it too easy, no?

---IWC

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ