ITASOR said:Apple shouldn't have the open "safe" files in the first place, that's just asking for trouble.
That's not true. It just means that the idea of what a "safe" file is needs to be re-evaluated.
ITASOR said:Apple shouldn't have the open "safe" files in the first place, that's just asking for trouble.
gunnmjk said:That's not true. It just means that the idea of what a "safe" file is needs to be re-evaluated.
lexfuzo said:Yes, the most important thing is to keep your eyes open. Antivirus - maybe, but don't rely on it blindly.
It is about time that even Mac-users start developing some consciousness for security issues.
The most interesting point in the article:mcgarry said:already the 2nd most discussed story on CNET, and climbing.
Meanwhile, here are some tips from Apple on safe practices in general, from last year.Apple is developing a patch for the flaw, a company representative told CNET News.com. "We're working on a fix so that this doesn't become something that could affect customers," the representative said, but could not give a delivery date for the update.
The .bin extension normally points to a need for Stuffit Expander (or some other program that can decode Binhex).ChampD1012 said:Then tried to download Yahoo Messenger, it showed it like this on my desktop: ymsgr_2.5.3-osx_install.bin,
latourfl said:The best solution, to me, would be that every time something is launched that was never launched before, then the user should be warned. OS X already have a system for this, it only needs to be more extensive (warn for shell scripts, AppleScripts, etc. as well), and provide more info : the name of the executable, where it is, who is the author, etc. so that we can make sure we trust the executable.
twitsami said:sounds like a good idea, one i think could work as long as its possible to make sure the executable is unique. I see an issue if its possible for the executable to claim to be another application, as in, the executable tells the computer its itunes, so it runs without warning...
apple.com said:The trusted application list is actually a list of trusted application objects (objects with the opaque type SecTrustedApplicationRef). In addition to serving as a reference to the application, a trusted application object includes data that uniquely identifies the application, such as a cryptographic hash. The system can use this data to verify that the application has not been altered since the trusted application object was created. For example, when a trusted application requests access to an item in the keychain, the system checks this data before granting access.
BlueRevolution said:if the exploit also works with Mail, would it not be possible to make a mass-mailing worm?
latourfl said:Well, I sure hope this problem is take care of in Keychain Access ! It seems it does :
http://developer.apple.com/document...pts/index.html#//apple_ref/doc/uid/TP30000897
michaellehn said:On my homepage
http://www.mathematik.uni-ulm.de/numerik/staff/lehn/index_us.html
I am hosting an exploit for Safari on Mac OS X. It requires that in Safari the option has to be enabled that allows "secure files" to be lunched automatically. Many users have this option enabled.
In this case it is sufficient that if you click on a link an shell-script is executed. In my example the shell script only prints "Hallo Welt". But it also could send emails or delete the user's home directory.
There will be no warning.
In several German online sites it was reported about my exploit:
http://www.heise.de/newsticker/meldung/69854
http://www.macnews.de/news/74203
http://www.macwelt.de/news/macosx/336525/index.html
best regards from Ulm/Germany,
Michael
MacSA said:Your famous now:
http://news.bbc.co.uk/1/hi/technology/4739432.stm
So far, no net-based exploits of the bug are known to be in existence
The risk to users from the virus is almost non-existent
Non existent eh? why all the fuss then?
Passante said:If a basic user does not need to run terminal can the application be deleted without harm to the system?![]()
MacSA said:Non existent eh? why all the fuss then?
twitsami said:Hmm, thats more about how applications are allowed access to the keychain, ie how its allowed to access your stored password...