Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2006-0848

Overview

Vulnerability Score 5.1 5.1
CVE Id CVE-2006-0848
Last Modified 18 Aug 2013 12:52:56
Published 22 Feb 2006 06:02:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity HIGH
Authentication NONE

CVE-2006-0848

Summary

The "Open 'safe' files after downloading" option in Safari on Apple Mac OS X allows remote user-assisted attackers to execute arbitrary commands by tricking a user into downloading a __MACOSX folder that contains metadata (resource fork) that invokes the Terminal, which automatically interprets the script using bash, as demonstrated using a ZIP file that contains a script with a safe file extension.

Vulnerable Systems

Operating System

  • Apple Mac Os X 10.4.5

  • Apple Mac Os X Server 10.4.5


References

CERT - TA06-062A

CERT - TA06-053A

CERT-VN - VU#999708

XF - macosx-zip-command-execution(24808)

VUPEN - ADV-2006-0671

BID - 16736

OSVDB - 23510

MISC - http://www.mathematik.uni-ulm.de/numerik/staff/lehn/macosx.html

MISC - http://www.heise.de/english/newsticker/news/69862

MISC - http://www.frsirt.com/exploits/20060222.safari_safefiles_exec.pm.php

SECTRACK - 1015652

SECUNIA - 18963

CONFIRM - http://docs.info.apple.com/article.html?artnum=303382


Last Updated: 27 May 2016 10:41:49