what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

ms01-053

ms01-053
Posted Oct 25, 2001

Microsoft Security Advisory MS01-053 - Binhex and Macbinary files which are downloaded in IE 5.1 for Mac OS X automatically execute, allowing attackers who run a malicious web site to run code on machines browsing the web. Microsoft FAQ on this issue available here.

tags | web
systems | apple, osx
SHA-256 | be385d1247f3dee9dd93aa62656eee7ed817062606b3e9807846ede26b7d22b7

ms01-053

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----

- ----------------------------------------------------------------------
Title: Downloaded Applications Can Execute on Mac IE 5.1 for
OS X
Date: 23 October 2001
Software: Internet Explorer 5.1 for Macintosh (r)
Impact: Run code of attacker's choice
Bulletin: MS01-053

Microsoft encourages customers to review the Security Bulletin at:
http://www.microsoft.com/technet/security/bulletin/MS01-053.asp.
- ----------------------------------------------------------------------

Issue:
======
The Macintosh OS X Operating System provides built-in support for
both BinHex and MacBinary file types. These file types allow for the
efficient transfer of information across networks by allowing
information to be compressed by the sender and then decompressed by
the recipient. This capability is particularly useful on the
Internet, by allowing users to dowload compressed files.

A vulnerability results because of a flaw in the way Mac OS X and Mac
IE 5.1 interoperate when BinHex and MacBinary file types are
downloaded. As a result, an application that is downloaded in either
of these formats can execute automatically once the download is
complete.

A user would first have to choose to download a file and allow the
download to fully complete before the application could execute.
Also, users can choose to disable the automatic decoding of both
these file types.

Mitigating Factors:
====================
- The user would have to choose to downoad the application before
any attempt could be made to exploit the vulnerablity. It cannot
be
exploited without user interaction.
- The application would have to successfully download before any
attempt could be made to exploit the vulnerability. The user can
cancel the download at anytime prior to completion.
- The vulnerability could not be exploited if automatic decoding of
BinHex and MacBinary files has been disabled. This is not a
default
setting however.

Patch Availability:
===================
- A patch is available to fix this vulnerability. Please read the
Security Bulletin at
http://www.microsoft.com/technet/security/bulletin/ms01-053.asp
for information on obtaining this patch.


- ---------------------------------------------------------------------

THE INFORMATION PROVIDED IN THE MICROSOFT KNOWLEDGE BASE IS
PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. MICROSOFT DISCLAIMS
ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
IN NO EVENT SHALL MICROSOFT CORPORATION OR ITS SUPPLIERS BE LIABLE
FOR ANY DAMAGES WHATSOEVER INCLUDING DIRECT, INDIRECT, INCIDENTAL,
CONSEQUENTIAL, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF
MICROSOFT CORPORATION OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. SOME STATES DO NOT ALLOW THE EXCLUSION
OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES SO
THE FOREGOING LIMITATION MAY NOT APPLY.

-----BEGIN PGP SIGNATURE-----
Version: PGP 7.1

iQEVAwUBO9YP740ZSRQxA/UrAQHZ1QgAqt3/4S1HGiUw0QDXJhtQ2ABR/JUgpLt4
7UgvF7b5qzja4mQrus/+vv/F64uQTdajmMUwmDMa5r30SbaljWiJ91mWBXRWBtIU
m+YmsyMuvriUrVvs9dGlyjOVZ3We+9utUElorWwgrObQv8lwTog0mMU+i9pdZHIQ
DodZArsKErEOdOVkHETwliRa3tOUnMzZnMEUIHtazEb0v5wzL9z2E89x7FEND4t8
wNNSuWTUYpsPL7idJ4B6JiBTi4H2WIyGI2ZuEYcTQ2StfRN16chyn0gYhf5g6v1v
WDEyZMG2WjQuw0IJRunsBZQ5FmrF10DosL12EGdhqKvdzxaravlWKg==
=qAZe
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

July 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jul 1st
    27 Files
  • 2
    Jul 2nd
    10 Files
  • 3
    Jul 3rd
    35 Files
  • 4
    Jul 4th
    27 Files
  • 5
    Jul 5th
    18 Files
  • 6
    Jul 6th
    0 Files
  • 7
    Jul 7th
    0 Files
  • 8
    Jul 8th
    28 Files
  • 9
    Jul 9th
    44 Files
  • 10
    Jul 10th
    24 Files
  • 11
    Jul 11th
    25 Files
  • 12
    Jul 12th
    11 Files
  • 13
    Jul 13th
    0 Files
  • 14
    Jul 14th
    0 Files
  • 15
    Jul 15th
    0 Files
  • 16
    Jul 16th
    0 Files
  • 17
    Jul 17th
    0 Files
  • 18
    Jul 18th
    0 Files
  • 19
    Jul 19th
    0 Files
  • 20
    Jul 20th
    0 Files
  • 21
    Jul 21st
    0 Files
  • 22
    Jul 22nd
    0 Files
  • 23
    Jul 23rd
    0 Files
  • 24
    Jul 24th
    0 Files
  • 25
    Jul 25th
    0 Files
  • 26
    Jul 26th
    0 Files
  • 27
    Jul 27th
    0 Files
  • 28
    Jul 28th
    0 Files
  • 29
    Jul 29th
    0 Files
  • 30
    Jul 30th
    0 Files
  • 31
    Jul 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close