Vulnerability Name:

CVE-2006-0848 (CCN-24808)

Assigned:2006-02-21
Published:2006-02-21
Updated:2017-07-20
Summary:The "Open 'safe' files after downloading" option in Safari on Apple Mac OS X allows remote user-assisted attackers to execute arbitrary commands by tricking a user into downloading a __MACOSX folder that contains metadata (resource fork) that invokes the Terminal, which automatically interprets the script using bash, as demonstrated using a ZIP file that contains a script with a safe file extension.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:5.1 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P)
4.2 Medium (Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
6.2 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-16
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2006-0848

Source: CONFIRM
Type: UNKNOWN
http://docs.info.apple.com/article.html?artnum=303382

Source: CCN
Type: Apple Security Update 2006-002
About Security Update 2006-002

Source: CCN
Type: SA18963
Mac OS X File Association Meta Data Shell Script Execution

Source: SECUNIA
Type: Vendor Advisory
18963

Source: CCN
Type: SECTRACK ID: 1015652
Apple Safari Lets Remote Users Cause Shell Code to Be Executed by the Target User

Source: SECTRACK
Type: Exploit
1015652

Source: CCN
Type: Apple Web site
Apple - Support - Downloads

Source: MISC
Type: Exploit, Vendor Advisory
http://www.frsirt.com/exploits/20060222.safari_safefiles_exec.pm.php

Source: MISC
Type: UNKNOWN
http://www.heise.de/english/newsticker/news/69862

Source: CCN
Type: heise online news 21.02.2006 21:05
Security hole in Mac OS X also affects Apple Mail

Source: CCN
Type: US-CERT VU#999708
Apple Safari automatically executes arbitrary shell commands or code

Source: CERT-VN
Type: Third Party Advisory, US Government Resource
VU#999708

Source: MISC
Type: UNKNOWN
http://www.mathematik.uni-ulm.de/numerik/staff/lehn/macosx.html

Source: OSVDB
Type: UNKNOWN
23510

Source: CCN
Type: OSVDB ID: 23510
Apple Safari ZIP Archive File Extension Mismatch Arbitrary File Execution

Source: BID
Type: Exploit
16736

Source: CCN
Type: BID-16736
Apple Mac OS X Archive Metadata Command Execution Vulnerability

Source: CERT
Type: Third Party Advisory, US Government Resource
TA06-053A

Source: CERT
Type: US Government Resource
TA06-062A

Source: VUPEN
Type: Vendor Advisory
ADV-2006-0671

Source: XF
Type: UNKNOWN
macosx-zip-command-execution(24808)

Source: XF
Type: UNKNOWN
macosx-zip-command-execution(24808)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    apple mac os x 10.4.5
    apple mac os x server 10.4.5
    apple mac os x 10.4.5
    apple mac os x server 10.4.5