Several security companies found a critical vulnerability in Apple Computer's OS X that could let attackers cripple a Mac simply by duping users into visiting a malicious Web site.
Several security companies warned users of a critical vulnerability in Apple Computer's OS X Tuesday that could let attackers cripple a Mac simply by duping them into visiting a malicious Web site.
Apple confirmed the vulnerability hours later. "We're working on a fix so
that this doesn't become something that could affect customers," a spokesman
for the Cupertino, Calif.-based company said.
ZIP files are considered safe by OS X, but by tweaking the archive file, attackers could pack a ZIP with malicious scripts that the Mac would automatically run, said German firm Heise Security, one of the first to publish an advisory.
The bug, noted Heise, could be invoked without user interaction via the bundled Safari browser and its default setting of "Open Safe Files after downloading."
"Problems ensue if a shell script is stored into a ZIP archive without the so-called 'shebang line,'" wrote Heise in its advisory. "If this line is omitted, Safari no longer recognizes the content as potentially dangerous and executes shell commands without a confirmation prompt."
Danish vulnerability tracker Secunia tagged the flaw as "Extremely critical" in its own alert Tuesday, the highest warning rating the company uses. FrSIRT, a French vendor, dubbed it "Critical."
The SANS Institute's Internet Storm Center, however, pointed out that Heise's explanation of the flaw actually said the vulnerability wasn't limited to Safari. The Mac operating system is, in fact, vulnerable, which opens other attack avenues, such as file attachments sent via e-mail or other tricks to bamboozle users into downloading files from Web sites.
"It looks like this can be used to fool users into starting the file no matter which vector is used," said the ISC's online warning. ZIP files can be disguised as, say, JPEG image files, the ISC noted, to hoodwink users into opening them.
Normally, OS X owners use the default "administrator account," which requires a password before most changes are made to the machine. Even so, an exploit using this vulnerability could wreak havoc by, for instance, deleting all files assigned to that user.
Safari users are most at risk, and should deactivate the "Open Safe Files after downloading" option in the "General" section of Safari's preferences. Alternate browsers, such as Firefox or Camino, are somewhat safer, said Heise, in that they won't automatically execute files.
"Users are advised to verify that the OS is using the proper file type," added Heise in response to possible hacker masquerades of ZIP archives as other file formats.
While Mac users have long defended their operating system as invulnerable to the kind of attack Windows users commonly suffer, Apple's taken several malware hits of late. Last week, two worms targeting Mac owners were discovered by security researchers.
For its part, the Apple spokesman reminded users "to only accept files from
vendors and Web sites that they know and trust."
Heise credited Michael Lehn of the University of Ulm with the discovery. Lehn has posted a harmless proof-of-concept for the vulnerability here. Several security companies, including Secunia and Heisse, have also posted online tests that show Mac users if their machine is vulnerable to the bug.
5 Top Federal Initiatives For 2015As InformationWeek Government readers were busy firming up their fiscal year 2015 budgets, we asked them to rate more than 30 IT initiatives in terms of importance and current leadership focus. No surprise, among more than 30 options, security is No. 1. After that, things get less predictable.