FaceTime for Mac Beta Opens Up Security Hole to Allow for Compromised Apple IDs
As related by MacNotes.de, Apple's new FaceTime for Mac beta application contains several security issues that could easily result in a user's Apple ID and iTunes Store account being compromised by individuals with physical access to the user's machine.
The primary issue appears to be FaceTime for Mac's display of account information, which reveals the user's date of birth and security question and answer for their account once signed in with their Apple ID, with no secondary request for password authentication. Consequently, anyone with physical access to a user's machine could view that information, which can then be used to reset the password for the account without requiring any email or other confirmation. The password can also be reset directly within the FaceTime application without a requirement that the current password be entered.
And while a user should in theory be able to address this issue by signing out of their account in FaceTime, the application automatically remembers the account details for the last-used account and pre-populates them the next time the application is opened or a sign-in is attempted.
Obviously there are any number of ways that sensitive information could be viewed or compromised by individuals with physical access to a user's machine, but the FaceTime application seems to make such actions remarkably easy, making private account reset information plainly visible at any point after initial log-in to the service.
Update: Apple appears to have addressed the issue on its end, as users are reporting that attempting to select the "View Account" option in FaceTime for Mac's preferences now briefly takes them to a blank window before bouncing them back to the selection page and offering no ability to view the account information.