First published: Tue Nov 10 2009(Updated: )
Launch Services in Apple Mac OS X 10.6.x before 10.6.2 recursively clears quarantine information upon opening a quarantined folder, which allows user-assisted remote attackers to execute arbitrary code via a quarantined application that does not trigger a "potentially unsafe" warning message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS and macOS | =10.6 | |
Apple iOS and macOS | =10.6.1 | |
Apple macOS Server | =10.6 | |
Apple macOS Server | =10.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-2810 is classified as a medium severity vulnerability due to its potential for remote code execution.
To fix CVE-2009-2810, update your Mac OS X to version 10.6.2 or later.
CVE-2009-2810 affects users of Apple Mac OS X versions 10.6 and 10.6.1.
CVE-2009-2810 is a code execution vulnerability that exploits how the Launch Services handles quarantined folders.
Yes, CVE-2009-2810 can be exploited by user-assisted attackers via a quarantined application.