The "Open 'safe' files after downloading" option in Safari on Apple Mac OS X allows remote user-assisted attackers to execute arbitrary commands by tricking a user into downloading a __MACOSX folder that contains metadata (resource fork) that invokes the Terminal, which automatically interprets the script using bash, as demonstrated using a ZIP file that contains a script with a safe file extension.
References
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2006-02-22 23:02
Updated : 2025-04-03 01:03
NVD link : CVE-2006-0848
Mitre link : CVE-2006-0848
CVE.ORG link : CVE-2006-0848
JSON object : View
Products Affected
apple
- mac_os_x
- mac_os_x_server
CWE
CWE-16
Configuration