Open Directory in Apple Mac OS X 10.7 before 10.7.2 does not require a user to provide the current password before changing this password, which allows remote attackers to bypass intended password-change restrictions by leveraging an unattended workstation.
Apple Mac OS X is prone to a local security-bypass vulnerability.An attacker can exploit this issue to change a user's password, aiding further attacks.NOTE: This issue was previously discussed in BID 50085 (Apple Mac OS X Prior to 10.7.2 Multiple Security Vulnerabilities) but has been given its own record to better document it.
The vendor released an update. Please see the references for details. Apple Mac OS X 10.7.1 Apple MacOSXUpd10.7.2.dmg http://www.apple.com/support/downloads/ Apple Mac OS X Server 10.7 Apple MacOSXServerUpdCombo10.7.2.dmg http://www.apple.com/support/downloads/ Apple Mac OS X Server 10.7.1 Apple MacOSXServerUpd10.7.2.dmg http://www.apple.com/support/downloads/ Apple Mac OS X 10.7 Apple MacOSXUpdCombo10.7.2.dmg http://www.apple.com/support/downloads/
An attacker requires local interactive access to exploit the issue.