This isn't shaping up to be a great year for Mac security. On the heels of last month's Flashback trojan pandemic, reports indicate that the latest OS X Lion update uncovers user passwords to prying eyes, too.
As ZDNet reports, OS X 10.7.3 spits out a debug log file containing "the login passwords of every user who has logged in since the update was applied." The file isn't generated on all configurations. However, "anyone who used FileVault encryption on their Mac prior to Lion, upgraded to Lion, but kept the folders encrypted using the legacy version of FileVault" could be affected. ZDNet quotes security researcher David Emery, who says the log files can be accessed by third parties in a variety of ways:
This is worse than it seems, since the log in question can also be read by booting the machine into firewire disk mode and reading it by opening the drive as a disk or by booting the new-with-LION recovery partition and using the available superuser shell to mount the main file system partition and read the file. This would allow someone to break into encrypted partitions on machines they did not have any idea of any login passwords for.
The worst part? OS X 10.7.3 came out on February 1, and someone pointed out the bug less than a week later on Apple's own Supper Communities message board. The only replies were posted yesterday, after his post was linked in the ZDNet story.
This is disappointing. Apple is bigger and more powerful than ever, and its Macs are gaining market share fast, yet it seems OS X's security is lagging behind. I hope the Mac maker locks down its operating system better than it has, and fast.