Vulnerability Note VU#433819
Apple Mail remote command execution vulnerability
Apple Mail contains a vulnerability that may allow an attacker to execute arbitrary commands on OS X Leopdard (10.5) systems.
Apple OS X uses resource forks to store structured data in files. Data forks are used to store unstructured data.
The AppleDouble standard is specified in RFC 1740:
Apple Mail parses resource forks in mail attachments that use the MIME format AppleDouble.
From the Heise Security report:
This allows an attacker to create an email with an attachment called picture.jpg that is displayed with a JPEG icon. But when the user tries to open the picture, Apple Mail analyses the resource fork and executes a shell script, for example, without further warning. In this case, even the MIME type displays the attachment as image/jpeg, but careful Mac users may become suspicious when they see that the picture is not immediately displayed as usual.
Note that to successfully exploit this vulnerability an attacker would need to convince a user to open a specially crafted email attachment with Apple Mail. Note that this vulnerability was originally addressed in APPLE-SA-2006-03-01, but was not addressed or reintroduced in Mac OS X Leopard. See US-CERT Technical Cyber Security Alert TA06-062A for more information about APPLE-SA-2006-03-01.
A remote, unauthenticated attacker may be able to execute arbitrary commands with the permissions of the user running Apple Mail.
We are currently unaware of a practical solution to this problem.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Apple Computer, Inc.||Affected||-||27 Nov 2007|
CVSS Metrics (Learn More)
This report was based on publicly available information provided by Heise Security.
This document was written by Ryan Giobbi.
- CVE IDs: Unknown
- Date Public: 25 Nov 2007
- Date First Published: 27 Nov 2007
- Date Last Updated: 27 Nov 2007
- Severity Metric: 9.28
- Document Revision: 32
If you have feedback, comments, or additional information about this vulnerability, please send us email.