February 21, 2006 2:59 PM PST

Mac OS flaw exposes Apple users

A serious flaw in Mac OS X could be a conduit for attackers to install malicious code on computers running the Apple Computer software, experts warned Tuesday.

The security problem is the third to surface for the operating system in the past week. It exposes Mac users to risks that are more familiar to Windows users: Visiting a malicious Web site using Apple's Safari Web browser could result in a rootkit, a backdoor or other malicious software being installed on the computer without the user noticing anything, experts said.

"This could be really bad," the SANS Internet Storm Center, which tracks network threats, said Tuesday. "Attackers can run shell scripts on your computer remotely just by visiting a malicious Web site."

Apple is developing a patch for the flaw, a company representative told CNET News.com. "We're working on a fix so that this doesn't become something that could affect customers," the representative said, but could not give a delivery date for the update.

Word of the new vulnerability comes after the recent discovery of a Trojan horse and a worm that target Mac users. The operating system had not been in the security crosshairs previously.

The new problem, discovered by Michael Lehn and first reported by Heise Online, lies in the way Mac OS X processes archive files. An attacker could embed malicious code in a ZIP file and host that on a Web site. The file and the embedded code would run when a Mac user visits the site using the Safari browser, experts said.

"Essentially, the operating system is executing commands that come in the metadata for ZIP files," said Alfred Huger, senior director of engineering at Symantec. "That is exacerbated by the problem that Safari will automatically open the file when you encounter it on the Web."

The issue may go beyond archive files, SANS said in updated notes on its Web site. "The attacker doesn't need to send a ZIP archive; the shell script itself can be disguised to practically anything," the note said.

The culprit appears to be the Mac OS Finder, the component of the operating system used to view and organize files, according to the SANS posting. A malicious file can be masked to look innocent--for example, like a JPEG image--yet it will run and execute when opened, SANS said.

This occurs because the operating system assigns an identifying image for the file based on the file extension, but decides which application will handle the file based on file permissions, SANS said. If the file has any executable bits set, it will be run using Terminal, the Unix command line prompt used in Mac OS X, SANS said.

There are no known attacks that take advantage of the flaw, experts said. However, proof-of-concept code that demonstrates the security vulnerability is publicly available online and could be tweaked for use in cyberattacks. "The skill level required to exploit it is very low. Pretty much anyone can do it," Huger said.

In the Windows world, such flaws are often exploited to install spyware or ad-serving software on vulnerable PCs. While such insidious software may be rare for the Mac, there are back doors and rootkits for the operating system, Huger said. "I think you'd likely see those installed with this type of vulnerability," he said.

The vulnerability is rated "extremely critical" by security monitoring company Secunia. Symantec also rates it "fairly high risk," Huger said. "If you have a Mac and use Safari, it is something you should remediate immediately," he said.

Mac OS X users can protect themselves by disabling the "Open safe files after downloading" option in Safari. In addition, users should be cautious when surfing the Web, the Apple representative said. "Apple always advises Mac users to only accept files from vendors and Web sites that they know and trust."

Users of alternative browsers such as Firefox and Camino on the Mac are not exposed to the Web-based attack vector, experts said.

See more CNET content tagged:
flaw, shell script, Apple Mac OS, attacker, Apple Safari


Join the conversation!
Add your comment
ah the first brick starts to crumble
and the first brick starts to crumble
Posted by capfan12 (101 comments )
Reply Link Flag
.... but right now it's more like a crack easily fixed before anything
serious happens. Meanwhile, we still have hundreds of thousands
of MS bricks shattered into dust at the bottom of the window.
Posted by Earl Benser (4310 comments )
Link Flag
Not really
As the article says... <strong><em>Simply disable "Open "safe"
files after downloading</em></strong> which prevents any file
to be automatically decompressed. There is a test online to see
if Safari is safe. Mine passed...

Test for Safari is talked about in this <a href="#"><strong>Ars Technica article&lt;/
strong&gt;</a> and is available <a href="#"><strong>here</strong></a>.
Posted by MacHeadCase (1 comment )
Link Flag
More Like a Grain of Sand Falling Out of the Industrial-strength Mortar ...
between some pretty solid bricks, and it's only a _potential_ problem if you're using Safari at the moment, that will likely be fixed a lot faster than the typical Windoze critical vulnerability. Some highly-critical Microsloth gaps have been around for more than six months without even being acknowledged by them, much less fixed, even with their endless stream of patches. I'm using FireFox, so I don't need to worry about this OS X issue, and even a newbie Safari user will get an automatic update with a fix offered as soon as it's available, not whenever Microsloth decides to fix it, much less deploy it according to its patch/"upgrade" cycle.

Note that this is a vulnerability, and there's no evidence of an exploit (yet - and given Apple's fairly quick response to this kind of thing, it probably won't be worth the time to develop an exploit, as has been the case to this point). Also, an exploit would have to be hosted on a site controlled by "evil-doers" (which your average Safari user isn't going to get to before the fix is installed), or a site run by dweebs who don't know any better than to quarantine uploaded files until they've been screened for malware before they can be downloaded.

And, before any other Microsloth-o-philes start trying to pile on, your time would be better spent making sure you've installed the latest security patches, and then complaining to Billy Grates about why there are still so many critical vulnerabilities in his products (not just Windoze) that haven't been addressed. One of these days, some sharp lawyer is going to bother reading the Microsloth End User License Agreements (EULAs) and realize that there are whole classes of users that they don't apply to - government agencies, and large corporations which have maintenance contracts, for instance, and then file class-action lawsuits to demand all of that junk gets fixed, or refunds are in order, with accrued interest since the date of purchase/licensing - treble damages to be awarded, indeed (at last count there were still over 250 lawsuits stemming from Microsloth's conviction as an abuser of monopoly power, so maybe every lawyer who can spell "high-tech" is already gainfully-employed with other law suits). Where are the lawyers when you really need them? Oh, yeah, they're all waiting for Dick Cheney to go on another quail hunting expedition to the deepest, darkest reaches along the Texas Gulf Coast. I'm surprised quail haven't been designated terrorists on the watch lists, yet (maybe Dan Rather should dress up as a quail and try to board an airliner to find out if they have been! :D ).

All the Best,
Joe Blow
Posted by Joe Blow (175 comments )
Link Flag
I don't see it
I don't see what they are so concerned about. I don't know what
configuration they are using, but my Safari does not "automatically"
open zip or any other archive files,....
Posted by corelogik (680 comments )
Reply Link Flag
It is a serious issue!
I have tried it out and it's as scary as the report says it is. By the way, I program Windows, Mac and Linux. Every application in the OSX is scriptable and IMHO, Mac is a disaster waiting to happen!
Posted by pdude (65 comments )
Link Flag
It is only a matter of time...
It is only a matter of time before the Mac OS becomes as popular a target as Windows. There will be a direct relationship between its share of desktop systems and the amount of viruses created to attack it.

Generally the UNIX based OS has proven more secure, but I do believe that with Vista Microsoft is taking a very serious approach to security issues. They will both be challenging to create viruses for, but there will still be programmers out there who will test their abilities against such a challenge.
Posted by coryschulz (326 comments )
Reply Link Flag
there presently is not a "direct relationship" between market share
and the amount of viruses for Mac, so why would that start now?

And seriously, Microsoft taking a serious approach to security is a
joke. Until they rewrite the core of the OS, they won't have serious
Posted by moopie23 (16 comments )
Link Flag
You willing...
To put money on a Microsoft 1.0 project the size of Vista, and go on record stating that it will probably be secure and challenging to write viruses for?

Because if you are I'd be willing to take those odds and put lots of money down...
Posted by UntoldDreams (91 comments )
Link Flag

Join the conversation

Add your comment

The posting of advertisements, profanity, or personal attacks is prohibited. Click here to review our Terms of Use.

What's Hot



RSS Feeds

Add headlines from CNET News to your homepage or feedreader.