CVE-2006-0848

high

Description

The "Open 'safe' files after downloading" option in Safari on Apple Mac OS X allows remote user-assisted attackers to execute arbitrary commands by tricking a user into downloading a __MACOSX folder that contains metadata (resource fork) that invokes the Terminal, which automatically interprets the script using bash, as demonstrated using a ZIP file that contains a script with a safe file extension.

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/24808

http://www.vupen.com/english/advisories/2006/0671

http://www.us-cert.gov/cas/techalerts/TA06-062A.html

http://www.us-cert.gov/cas/techalerts/TA06-053A.html

http://www.osvdb.org/23510

http://www.mathematik.uni-ulm.de/numerik/staff/lehn/macosx.html

http://www.kb.cert.org/vuls/id/999708

http://www.heise.de/english/newsticker/news/69862

http://secunia.com/advisories/18963

http://docs.info.apple.com/article.html?artnum=303382

Details

Source: Mitre, NVD

Published: 2006-02-22

Updated: 2017-07-20

Risk Information

CVSS v2

Base Score: 5.1

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Severity: High