CVE-2012-3720

Severity

43%

Complexity

86%

Confidentiality

48%

Mobile Accounts in Apple Mac OS X before 10.7.5 and 10.8.x before 10.8.2 saves password hashes for external-account use even if external accounts are not enabled, which might allow remote attackers to determine passwords via unspecified access to a mobile account.

Mobile Accounts in Apple Mac OS X before 10.7.5 and 10.8.x before 10.8.2 saves password hashes for external-account use even if external accounts are not enabled, which might allow remote attackers to determine passwords via unspecified access to a mobile account.

CVSS 2.0 Base Score 4.3. CVSS Attack Vector: network. CVSS Attack Complexity: medium. CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N).

Overview

First reported 12 years ago

2012-09-20 21:55:00

Last updated 12 years ago

2012-09-21 04:00:00

Affected Software

Apple Mac OS X 10.0

10.0

Apple Mac OS X 10.0.0

10.0.0

Apple Mac OS X 10.0.1

10.0.1

Apple Mac OS X 10.0.2

10.0.2

Apple Mac OS X 10.0.3

10.0.3

Apple Mac OS X 10.0.4

10.0.4

Apple Mac OS X 10.1

10.1

Apple Mac OS X 10.1.0

10.1.0

Apple Mac OS X 10.1.1

10.1.1

Apple Mac OS X 10.1.2

10.1.2

Apple Mac OS X 10.1.3

10.1.3

Apple Mac OS X 10.1.4

10.1.4

Apple Mac OS X 10.1.5

10.1.5

Apple Mac OS X 10.2

10.2

Apple Mac OS X 10.2.0

10.2.0

Apple Mac OS X 10.2.1

10.2.1

Apple Mac OS X 10.2.2

10.2.2

Apple Mac OS X 10.2.3

10.2.3

Apple Mac OS X 10.2.4

10.2.4

Apple Mac OS X 10.2.5

10.2.5

Apple Mac OS X 10.2.6

10.2.6

Apple Mac OS X 10.2.7

10.2.7

Apple Mac OS X 10.2.8

10.2.8

Apple Mac OS X 10.3

10.3

Apple Mac OS X 10.3.0

10.3.0

Apple Mac OS X 10.3.1

10.3.1

Apple Mac OS X 10.3.2

10.3.2

Apple Mac OS X 10.3.3

10.3.3

Apple Mac OS X 10.3.4

10.3.4

Apple Mac OS X 10.3.5

10.3.5

Apple Mac OS X 10.3.6

10.3.6

Apple Mac OS X 10.3.7

10.3.7

Apple Mac OS X 10.3.8

10.3.8

Apple Mac OS X 10.3.9

10.3.9

Apple Mac OS X 10.4

10.4

Apple Mac OS X 10.4.0

10.4.0

Apple Mac OS X 10.4.1

10.4.1

Apple Mac OS X 10.4.2

10.4.2

Apple Mac OS X 10.4.3

10.4.3

Apple Mac OS X 10.4.4

10.4.4

Apple Mac OS X 10.4.5

10.4.5

Apple Mac OS X 10.4.6

10.4.6

Apple Mac OS X 10.4.7

10.4.7

Apple Mac OS X 10.4.8

10.4.8

Apple Mac OS X 10.4.9

10.4.9

Apple Mac OS X 10.4.10

10.4.10

Apple Mac OS X 10.4.11

10.4.11

Apple Mac OS X 10.5

10.5

Apple Mac OS X 10.5.0

10.5.0

Apple Mac OS X 10.5.1

10.5.1

Apple Mac OS X 10.5.2

10.5.2

Apple Mac OS X 10.5.3

10.5.3

Apple Mac OS X 10.5.4

10.5.4

Apple Mac OS X 10.5.5

10.5.5

Apple Mac OS X 10.5.6

10.5.6

Apple Mac OS X 10.5.7

10.5.7

Apple Mac OS X 10.5.8

10.5.8

Apple Mac OS X 10.6.0

10.6.0

Apple Mac OS X 10.6.1

10.6.1

Apple Mac OS X 10.6.2

10.6.2

Apple Mac OS X 10.6.3

10.6.3

Apple Mac OS X 10.6.4

10.6.4

Apple Mac OS X 10.6.5

10.6.5

Apple Mac OS X 10.6.6

10.6.6

Apple Mac OS X 10.6.7

10.6.7

Apple Mac OS X 10.6.8

10.6.8

Apple Mac OS X 10.7.0

10.7.0

Apple Mac OS X 10.7.1

10.7.1

Apple Mac OS X 10.7.2

10.7.2

Apple Mac OS X 10.7.3

10.7.3

Apple Mac OS X

Apple Mac OS X 10.8.0

10.8.0

Apple Mac OS X 10.8.1

10.8.1

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.