Apple Mac OS System X - Critical Vulnerability and published Exploit
Apple will most likely patch this vulnerability soon and Mac users
should look for any System X updates. Just as in the Windows environment,
everyone needs to be careful of any suspicious email attachments, email URL
links, or unfamiliar websites.
Apple Mac OS X Metadata Handling Remote Shell Execution
Description: The vulnerability is caused due to an error in
the processing of file association meta data in ZIP archives (stored in the
"__MACOSX" folder) and mail messages (defined via the AppleDouble MIME format).
This can be exploited to trick users into executing a malicious shell script
renamed to a safe file extension stored in a ZIP archive or in a mail
attachment. This can also be exploited automatically via the Safari browser when
visiting a malicious web site.
Exploit: One exploit has been
published and the code can be reviewed at the FrSIRT site
Patches: None published so
Workarounds: Do not open files
in archives or mail attachments originating from untrusted sources. The
vulnerability can be mitigated by disabling the "Open safe files after
downloading" option in Safari.