First published: Wed Feb 22 2006(Updated: )
The "Open 'safe' files after downloading" option in Safari on Apple Mac OS X allows remote user-assisted attackers to execute arbitrary commands by tricking a user into downloading a __MACOSX folder that contains metadata (resource fork) that invokes the Terminal, which automatically interprets the script using bash, as demonstrated using a ZIP file that contains a script with a safe file extension.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mac OS X Server | =10.4.5 | |
macOS Yosemite | =10.4.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0848 is considered a medium severity vulnerability due to its reliance on user interaction to exploit.
To fix CVE-2006-0848, it is recommended to disable the 'Open 'safe' files after downloading' option in Safari's preferences.
CVE-2006-0848 affects Apple Mac OS X 10.4.5 and macOS Yosemite.
CVE-2006-0848 enables remote user-assisted attacks that can lead to arbitrary command execution on the affected systems.
No, CVE-2006-0848 requires user interaction, as it relies on tricking the user into downloading the malicious file.