link: http://secunia.com/advisories/18963/
22. februar:
‘Michael Lehn has discovered a vulnerability in Mac OS X, which can be exploited by malicious people to compromise a user’s system.
The vulnerability is caused due to an error in the processing of file association meta data in ZIP archives (stored in the ‘__MACOSX’ folder) and mail messages (defined via the AppleDouble MIME format). This can be exploited to trick users into executing a malicious shell script renamed to a safe file extension stored in a ZIP archive or in a mail attachment.’
postoji test, zaista radi to što kaže, probajte…
http://secunia.com/mac_os_x_command_execution_vulnerability_test/
informacija se pojavila i na apple forumu:
http://discussions.apple.com/thread.jspa?messageID=1810923�
koristan link: http://www.macfixit.com/article.php?story=20060224105335758
dok apple uskoro ne izbaci patch, jedini ‘fix’: safari/preferences/general, isključti opciju ‘open ‘safe’ files after downloading’...