Description
nidump on MacOS X before 10.3 allows local users to read the encrypted passwords from the password file by specifying passwd as a command line argument.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Steven Kreuzer · textremoteosx
https://www.exploit-db.com/exploits/20984
References (6)
Core 6
Core References
Mailing List x_refsource_confirm
http://lists.apple.com/mhonarc/security-announce/msg00038.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1001946
Exploit, Vendor Advisory x_refsource_misc
http://www.securiteam.com/securityreviews/5QP032A4UU.html
Patch, Vendor Advisory x_refsource_misc
http://www.securemac.com/macosxnidump.php
Vendor Advisory mailing-list
x_refsource_bugtraq
http://lists.insecure.org/lists/bugtraq/2002/Sep/0128.html
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=99953038722104&w=2
Scores
EPSS
0.0023
EPSS Percentile
45.9%
Details
Status
published
Products (1)
apple/mac_os_x
10.4.9
Published
Nov 17, 2003
Tracked Since
Feb 18, 2026