Apple MacOS Internet Explorer文件执行漏洞

Apple MacOS Internet Explorer文件执行漏洞

漏洞ID 1106585 漏洞类型 设计错误
发布时间 2002-01-22 更新时间 2005-10-12
图片[1]-Apple MacOS Internet Explorer文件执行漏洞-安全小百科CVE编号 CVE-2002-0153
图片[2]-Apple MacOS Internet Explorer文件执行漏洞-安全小百科CNNVD-ID CNNVD-200204-020
漏洞平台 OSX CVSS评分 7.5
|漏洞来源
https://www.exploit-db.com/exploits/21238
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-200204-020
|漏洞详情
Macintosh的InternetExplorer5.1版本存在漏洞。远程攻击者绕过安全检查和调用具有HTML元素的本地AppleScripts,也称为“本地Applescript调用”漏洞。
|漏洞EXP
source: http://www.securityfocus.com/bid/3935/info

A vulnerability has been discovered in MacOS systems running Internet Explorer 5.1 and earlier. MacOS X is not affected by this issue.

File URLs may be used by a malicious webmaster to execute programs on a web user's local system. The exact path to the location of the file must be known. This includes being able to anticipate the name of a particular user's hard drive.

This issue may be exploited to execute "Speakable Items" in MacOS 8 and 9.

This issue may also be exploitable through maliciously crafted HTML-enabled e-mail. 

<META HTTP-EQUIV="refresh" CONTENT="1; URL=file:///Macintosh%20HD/System%20Folder/Speakable%20Items/Put%20Computer%20To%20Sleep">
|参考资料

来源:MS
名称:MS02-019
链接:http://www.microsoft.com/technet/security/bulletin/ms02-019.asp
来源:XF
名称:ie-macos-file-execution(7969)
链接:http://xforce.iss.net/xforce/xfdb/7969
来源:BID
名称:3935
链接:http://www.securityfocus.com/bid/3935
来源:BUGTRAQ
名称:20020122MacinoshIEfileexecuion
链接:http://www.securityfocus.com/archive/1/251805
来源:OSVDB
名称:5356
链接:http://www.osvdb.org/5356
来源:XF
名称:ie-mac-applescript-execution(8851)
链接:http://www.iss.net/security_center/static/8851.php

相关推荐: Blackmoon FTP Server Plaintext User Password Weakness

Blackmoon FTP Server Plaintext User Password Weakness 漏洞ID 1100319 漏洞类型 Design Error 发布时间 2003-05-21 更新时间 2003-05-21 CVE编号 N/A CNN…

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享