Apple Mac OS X does not properly verify the authenticity of updates, which allows man-in-the-middle attackers to execute arbitrary code via a Trojan horse update, as demonstrated by evilgrade and DNS cache poisoning.
The product downloads source code or an executable from a remote location and executes the code without sufficiently verifying the origin and integrity of the code.
Link | Tags |
---|---|
http://www.infobyte.com.ar/down/Francisco%20Amato%20-%20evilgrade%20-%20ENG.pdf | broken link |
http://www.infobyte.com.ar/down/isr-evilgrade-1.0.0.tar.gz | broken link |
http://archives.neohapsis.com/archives/bugtraq/2008-07/0250.html | broken link mailing list |