SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   OS (UNIX)  >   Mac OS X Vendors:   Apple Computer
Mac OS X CoreTypes May Not Warn Users Before Opening Unsafe File Types
SecurityTracker Alert ID:  1020137
SecurityTracker URL:  http://securitytracker.com/id/1020137
CVE Reference:   CVE-2008-1032   (Links to External Site)
Date:  May 29 2008
Impact:   Modification of system information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 10.5.3
Description:   A vulnerability was reported in Mac OS X CoreTypes. A user may not be warned before opening certain unsafe file types.

A remote user can create a specially crafted file type that, when downloaded by the target user, will cause the system to fail to warn the user of the potentially unsafe file type.

Automator, Help, Safari, and Terminal are affected.

Brian Mastenbrook reported this vulnerability.

Impact:   A user may not be warned before opening certain unsafe file types.
Solution:   The vendor has issued a fix as part of Security Update 2008-003 and Mac OS X v10.5.3, available from the Software Update pane in System Preferences, or Apple's Software Downloads web site at:

http://www.apple.com/support/downloads/

The Software Update utility will present the update that applies to your system configuration. Only one is needed, either Security Update 2008-003 or Mac OS X v10.5.3.

For Mac OS X v10.5.2
The download file is named: "MacOSXUpd10.5.3.dmg"
Its SHA-1 digest is: 017ef905e5653b04e2455da261e804a72bf40139

For Mac OS X v10.5 - v10.5.1
The download file is named: "MacOSXUpdCombo10.5.3.dmg"
Its SHA-1 digest is: 69acd7399de25f1548675d660fdf24eb401e3de3

For Mac OS X Server v10.5.2
The download file is named: "MacOSXServerUpd10.5.3.dmg"
Its SHA-1 digest is: 336c9dceca724eab0b8c9db3943be3f9ecf244a4

For Mac OS X Server v10.5 - v10.5.1
The download file is named: "MacOSXServerUpdCombo10.5.3.dmg"
Its SHA-1 digest is: fdb2187d19ce21caecd3c3ba6b6fa6f65c9c3a4f

For Mac OS X v10.4.11 (Intel)
The download file is named: "SecUpd2008-003Intel.dmg"
Its SHA-1 digest is: 8f84d2f757c2fb277b139f72ef501dc894620e97

For Mac OS X v10.4.11 (PowerPC)
The download file is named: "SecUpd2008-003PPC.dmg"
Its SHA-1 digest is: 51e98d988c5bb09d4b1052199d90a9d65af7c8e7

For Mac OS X Server v10.4.11 (Universal)
The download file is named: "SecUpdSrvr2008-003Univ.dmg"
Its SHA-1 digest is: 337a05956b5a6e962b286a91beee9eb217a0175c

For Mac OS X Server v10.4.11 (PowerPC)
The download file is named: "SecUpdSrvr2008-003PPC.dmg"
Its SHA-1 digest is: 94cab2b4e5d26a284c5d91d0fe4dc20b4e9cfc97

The vendor's advisory is available at:

http://support.apple.com/kb/HT1897

Vendor URL:  support.apple.com/kb/HT1897 (Links to External Site)
Cause:   State error
Underlying OS:  

Message History:   None.


 Source Message Contents

Date:  Wed, 28 May 2008 15:59:23 -0700
Subject:  APPLE-SA-2008-05-28 Security Update 2008-003 and Mac OS X v10.5.3

CoreTypes
CVE-ID:  CVE-2008-1032
Available for:  Mac OS X v10.4.11, Mac OS X Server v10.4.11,
Mac OS X v10.5 through v10.5.2, Mac OS X Server v10.5 through v10.5.2
Impact:  Users are not warned before opening certain potentially
unsafe content types
Description:  This update extends the system's list of content types
that will be flagged as potentially unsafe under certain
circumstances, such as when they are downloaded from a web page.
While these content types are not automatically launched, if manually
opened they could lead to the execution of a malicious payload. This
update improves the system's ability to notify users before handling
content types used by Automator, Help, Safari, and Terminal. On Mac
OS X v10.4 this functionality is provided by the Download Validation
feature. On Mac OS X v10.5 this functionality is provided by the
Quarantine feature. Credit to Brian Mastenbrook for reporting this
issue.
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC