Launch Services in Apple Mac OS X before 10.5, when Open Safe Files is enabled, allows remote attackers to execute arbitrary code via a symlink attack, probably related to a race condition and automatic execution of a downloaded file.
The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Link | Tags |
---|---|
http://support.apple.com/kb/HT2163 | patch |
http://www.vupen.com/english/advisories/2008/1981/references | vdb entry |
http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html | vendor advisory |
http://secunia.com/advisories/30802 | third party advisory vendor advisory |
http://securitytracker.com/id?1020393 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/43495 | vdb entry |
http://www.securityfocus.com/bid/30018 | vdb entry |