Linked by Thom Holwerda on Tue 21st Feb 2006 17:59 UTC
Mac OS X "[Last week], we reported on a Trojan horse for Mac OS X that is just like the entry for Earth in the Hitchhiker's Guide to the Galaxy in that it is mostly harmless. A new vulnerability targeted at Apple's home-grown web browser, Safari, is another matter entirely. A German security firm appears to have been the first to discover the Safari flaw, which allows for shell scripts to be executed after clicking a link."
Thread beginning with comment 97942
To view parent comment, click here.
To read all comments associated with this story, please click here.
RE: Quick Fix
by ormandj on Tue 21st Feb 2006 20:56 UTC in reply to "Quick Fix"
ormandj
Member since:
2005-10-09

That really doesn't "fix" the vulnerability. It just means the author has to change the shell script a bit to point to the right path. The fix is disable opening "safe" files after downloading (temporary) and then Apple rolling out something to make executables easily found. This means changing pardigrams for file information, and not relying on the file creator's "word" so to speak.

Reply Parent Score: 1

RE[2]: Quick Fix
by mdsama on Tue 21st Feb 2006 21:09 in reply to "RE: Quick Fix"
mdsama Member since:
2005-07-08

You're right it's not a "fix" but I'm assuming each script can only refer to one path for the app, and I'm also assuming a trojan would be set to refer to the default path, so it seems like a good idea for the time being to me, until a real fix, as you say, is rolled out.

Reply Parent Score: 1

RE[3]: Quick Fix
by ormandj on Tue 21st Feb 2006 21:16 in reply to "RE[2]: Quick Fix"
ormandj Member since:
2005-10-09

Just disable "open safe files after downloading" or whatever that option is. That's a much better alternative, because it doesn't matter if the trojan writers change the paths, it still won't execute unless you run it yourself. You should consider selling your PC if you double click images that randomly download off sites you don't know. ;)

Reply Parent Score: 1