New Serious flaw found on OSX

Joined
Nov 12, 2004
Messages
356
Reaction score
9
Points
18
Location
Lancashire, UK
Your Mac's Specs
MacMini DC 1.66, Powerbook G4
http://isc.incidents.org/diary.php?storyid=1138

Thoughts? I understand the first part, but can someone explain the second part please of how this still makes a machine vulnerable without needing Safari?

I ask this because surely the user would have to decompress the file to begin with, and if the file is from a suspicious/malicious site, then a user would not choose to unzip it ?

Also, does OSX not give you a warning when you are unzipping a file if there are commands in it?
 
Joined
Jun 27, 2005
Messages
1,165
Reaction score
22
Points
38
Location
In the mac store and at home on my iMac
thats terrible i bet apple will fix it sooner rather than later
 
Joined
Apr 8, 2005
Messages
472
Reaction score
23
Points
18
I tried it with Shiira, it landed on my desk top.. In safari I unchecked this box a long time ago, it stops the automatic opening of a file.
 
OP
Kyomii
Joined
Nov 12, 2004
Messages
356
Reaction score
9
Points
18
Location
Lancashire, UK
Your Mac's Specs
MacMini DC 1.66, Powerbook G4
jram said:
I tried it with Shiira, it landed on my desk top.. In safari I unchecked this box a long time ago, it stops the automatic opening of a file.


Yes, I agree. I always have mine unticked too. However, they are saying, even if it is unchecked in Safari that it still presents a serious risk in the updated part, as it does not require Safari to run.

Just wanted to know in layman's terms what they are trying to say in the second part of the report as I can see the vulnerability, but the method behind it (having to uncompress a suspect file) is unlikely to happen too much - unless users are in the habit of uncompressing suspect files perhaps?
 
Joined
Apr 8, 2005
Messages
472
Reaction score
23
Points
18
I really don't understand, but I just clicked on a link that is suppose to be a demo of the exploit.. It didn't open, are you saying it doesn't have to open??
 
K

Kokopelli

Guest
This is just a reflection of Safari autohandleing certain file types automatically near as I can tell.

This was corrected for default behavior with the whole widget fiasco. If someone has safari (or other app) set to autohandle the file there is a risk. Further as near as I can tell you can have a script autorun on unzipping of the file, this might not be the wisest of things to allow a zip file to do without warning. If that is the case then it is "as designed" but is a potential problem.
 
J

JunMacTech

Guest
You guys are missing the severity of this:

Taken from link:
When this script was stored in a ZIP archive, Mac OS X will add a binary metadata to the archive. This file determines what will be used to open the main file in the archive, regardless of the extension or symbol displayed in the Finder.

This has nothing to do with safari. Malicious files can be disguised to appear like any file that the mean ol destructor of the mac omniverse desires. One simple way to guard from this is to stick to column view. The nice little preview window will tell you what app is associated with the file, regardless of name and extension.
 
Joined
Jan 8, 2005
Messages
6,188
Reaction score
254
Points
83
Location
New Jersey
Your Mac's Specs
Mac Pro 8x3.0ghz 12gb ram 8800GT , MBP 2.16 2GB Ram 17 inch.
JunMacTech said:
This has nothing to do with safari. Malicious files can be disguised to appear like any file that the mean ol destructor of the mac omniverse desires. One simple way to guard from this is to stick to column view. The nice little preview window will tell you what app is associated with the file, regardless of name and extension.

I believe this to be correct in some ways, although they are saying that it can be applied in any file format, they are saying it is launched through safari. If you acces this file in any other way (ie. through mail or an im transfer) then you will have to execute it yourself, which is not much of a threat because you should know how your computer works and how it should handle certainf file types.. you are correct that a good way to protect yourself is to use column veiw but an other good way to protect yourself would be to enbable file extentions in finder so you can see what it is you are dealing with. It is very easy for somebody (like it already occured) to change the icon of an application to appear to be a jpeg.
 
J

JunMacTech

Guest
PowerBookG4 said:
If you acces this file in any other way (ie. through mail or an im transfer) then you will have to execute it yourself, which is not much of a threat because you should know how your computer works and how it should handle certainf file types..

I agree that I know how my computer works, and that users SHOULD. Unfortunately for me, most of the users that I support do not. If it looks like a jpeg, they are going to open it. If they downloaded a "mp3" from a peer to peer network, they aren't going to pay attention to the fact that it is only 2KB. They are going to execute that file and execute the nice little script that deletes their home directory.

I can show them how to protect themselves, the fact is they won't.

I can lead the horse to water, **** I can toss it in. But unless I ram a feeding tube down it's throat or stick it with an IV, 90% of the time it's not going to take a drink.
 
T

Tiranis

Guest
Hmm... I agree with JunMacTech, but the problem here is: how do you "fix it"? First, Apple has to keep the support for custom icons on all files—there would be many complaints if they didn't, so now what do you do? I, honestly, have no idea. :-\
 
Joined
Mar 30, 2004
Messages
4,744
Reaction score
381
Points
83
Location
USA
Your Mac's Specs
12" Apple PowerBook G4 (1.5GHz)
Tiranis said:
Hmm... I agree with JunMacTech, but the problem here is: how do you "fix it"? First, Apple has to keep the support for custom icons on all files—there would be many complaints if they didn't, so now what do you do? I, honestly, have no idea. :-\
Other people have suggested that the Finder should attach a "badge" (a small overlaid icon, like the arrow on an alias) to every executable. This would have to include applications and Terminal documents (like the shell script in the proof-of-concept) at a minimum, and perhaps AppleScripts. No matter what icon you paste onto the file, the badge would appear over it.
 
B

Badger

Guest
The code activates and runs in the Terminal; it does not run in Safari. Deselecting the open safe files option does not prevent downloading the malicious file; it only prevents it from being automatically opened. And it does not stop Mail or other programs from opening the file. You can prevent the code from running by simply renaming the Terminal to something else like myTerminal. Macintouch has posted a link to a non-harmful example to test your system.
 
Joined
Jan 8, 2005
Messages
6,188
Reaction score
254
Points
83
Location
New Jersey
Your Mac's Specs
Mac Pro 8x3.0ghz 12gb ram 8800GT , MBP 2.16 2GB Ram 17 inch.
It would be productive to do that, but how many people who want to make their own applicatoin with their own icon would get annoyed by the fact that there is going to be a badge over it?
 
J

JunMacTech

Guest
Badger said:
The code activates and runs in the Terminal; it does not run in Safari. Deselecting the open safe files option does not prevent downloading the malicious file; it only prevents it from being automatically opened. And it does not stop Mail or other programs from opening the file. You can prevent the code from running by simply renaming the Terminal to something else like myTerminal. Macintouch has posted a link to a non-harmful example to test your system.

Interesting, I had read that renaming these apps could break other things...?
 
J

JunMacTech

Guest
JunMacTech said:
Interesting, I had read that renaming these apps could break other things...?

Ok, here is what I did.

Renamed /applications/utilities/Terminal.app
to _Terminal.app

Create a workflow containing:
Ask for Confirmation
Launch Application

In the Ask for Confirmation, say something like Are you sure you wish to launch the Terminal? Give the security reasons why.

Launch application - > Point to _Terminal.app

Save the workflow as an application called Terminal.app in /applications/utilities

Now whenever /applications/utilities/Terminal.app is called, it will request your permission.
 
Joined
Jan 8, 2005
Messages
6,188
Reaction score
254
Points
83
Location
New Jersey
Your Mac's Specs
Mac Pro 8x3.0ghz 12gb ram 8800GT , MBP 2.16 2GB Ram 17 inch.
Changing applications names will not break anything unless the application is required by something else to run, for example changing the name of terminal will "break" the virus because its non-ability to find the application that it is looking for.
 

dtravis7


Retired Staff
Joined
Jan 4, 2005
Messages
30,133
Reaction score
703
Points
113
Location
Modesto, Ca.
Your Mac's Specs
MacMini M-1 MacOS Monterey, iMac 2010 27"Quad I7 , MBPLate2011, iPad Pro10.5", iPhoneSE
JunMacTech, Very good idea. I named my Terminal something else but it works great. Again, great idea.
 
J

JunMacTech

Guest
dtravis7 said:
JunMacTech, Very good idea. I named my Terminal something else but it works great. Again, great idea.

Actually it wasnt my idea, it was on MacInTouch, well sort of. They had everything except for the actual workflow. That was the easy part though. Gotta give credit where credit is due.

Whereas it doesn't actually protect you from anything, it gives my users that one extra step that might turn on a lightbulb upstairs.
 

Shop Amazon


Shop for your Apple, Mac, iPhone and other computer products on Amazon.
We are a participant in the Amazon Services LLC Associates Program, an affiliate program designed to provide a means for us to earn fees by linking to Amazon and affiliated sites.
Top