Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading
Extremely critical

Mac OS X Volume URI Handler Registration Code Execution Vulnerability

-

Release Date:  2004-05-22    Last Update:  2004-06-08    Views:  66,908

Secunia Advisory SA11689

Where:

From remote

Impact:

System access

Solution Status:

Vendor Patch

Operating System:

CVE Reference(s):

Description


A vulnerability has been reported in Mac OS X, allowing malicious web sites to compromise a vulnerable system.

The problem is that code silently delivered using variants of the "disk" URI handler vulnerability described in SA11622, can be executed without using the "help" URI handler.

Two methods have been discussed, allowing malicious websites to execute code from mounted disk images:

1) A disk image or a volume (e.g. AFS, SMB, FTP, or DAV) can register arbitrary URI handlers, which will execute code placed on the disk image when accessing the URI.

2) A disk image or a volume can change an unused URI handler (e.g. TN3270) to execute code placed on the disk image when accessing the URI.

This problem is escalated due to the fact that it by default is possible to silently download and mount disk images using two known methods (silent download and execution of "safe" files and the "disk" URI). Furthermore, it is reportedly also possible to mount volumes using other methods such as SMB, AFS, FTP, DAV and others.

This vulnerability has been confirmed on a fully patched Mac OS X systems (including the patch "Security Update 2004-05-24 for Mac OS X" released by Apple, which fixes the "help" URI handler vulnerability) running versions 10.3.3 and 10.3.4.

Reportedly, working exploits using "ftp" exist, but also "afp" seems to be a likely attack vector.
It may also be possible to use "ssh" to open a connection to a remote site allowing the remote site to gain direct access to a vulnerable system.

The core of the problem seems to be the design of URI handling in Mac OS X. It is likely that many other URI handlers are affected in various ways.

Attack vectors include browsers and programs supporting Mac OS X URI handling.


Solution:
Apple has issued Security Update 2004-06-07, which addresses the vulnerability by presenting users with a dialog box the first time a file is launched automatically.

Further details available to Secunia VIM customers

Provided and/or discovered by:
Information about this was first provided to Secunia by Jens Jakob Jensen from ozwix.dk.

Original Advisory:
Apple Security Updates:
http://www.apple.com/support/security/security_updates.html

About Security Update 2004-06-07:
http://docs.info.apple.com/article.html?artnum=25785

Deep Links:
Links available to Secunia VIM customers

Do you have additional information related to this advisory?

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

Subject: Mac OS X Volume URI Handler Registration Code Execution Vulnerability

No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Factsheets
Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability