HTTP: Apple Mac OS X Archive Metadata Command Execution

This signature detects attempts to exploit a known vulnerability against Apple MAC. A successful exploit can lead to remote command execution.

Extended Description

Apple Mac OS X is prone to an arbitrary command-execution vulnerability when processing metadata in archive files. Commands would be executed in the context of the user opening the archive file. Attackers can reportedly use Safari and Apple Mail as exploitation vectors for this vulnerability. Mac OS X 10.4.5 is reported to be vulnerable. Earlier versions may also be affected.

Affected Products

Apple mac_os_x_server

References

BugTraq: 16736

CVE: CVE-2006-0848

Short Name
HTTP:MISC:MAC-COMM-EXEC
Severity
Minor
Recommended
False
Recommended Action
None
Category
HTTP
Keywords
Apple Archive CVE-2006-0848 Command Execution Mac Metadata OS X bid:16736
Release Date
06/09/2015
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3375
False Positive
Unknown
Vendors

Apple

CVSS Score

5.1

Found a potential security threat?