An attacker could easily exploit two "extremely critical" vulnerabilities in Apple Macintosh OS X software and...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
there is no efficient solution to the problem, IT security firm Secunia said in an advisory Monday.
Thomas Kristensen, chief technology officer of the Copenhagen, Denmark-based company, attributed the discovery to various people and Web sites and said the best defense is to stay away from "untrusted" Web sites, rename all URI handlers that are not required and avoid surfing the Internet as a privileged user.
"One of the important points is that you don't want to visit malicious sites," Kristensen said. "Unfortunately, it's not always easy to recognize a malicious site. And since we first started to hear about this over the weekend, a lot of details on how to exploit the vulnerabilities have made it onto the Internet."
The advisory said the first problem is that the "help" URI handler "allows execution of arbitrary local scripts (.scpt) via the classic directory traversal character sequence using "help:runscript." The second flaw is that it may also be possible to silently place arbitrary files, including script files, in a known location on a user's system using the "disk" URI handler.
Malicious code writers could successfully exploit the vulnerabilities using 1.2.1 (125.1) and Internet Explorer 5.2. Other browsers may also be used as attack vectors, the advisory said.
The vulnerabilities have been upgraded to extremely critical because the issues are easy to exploit with remote access and a large number of working exploits are available, the advisory said.
On the plus side, attackers are less likely to go after Macintosh software because it is not as widely used as Windows products, Kristensen said.
"If these were Windows vulnerabilities, they would certainly be exploited," he said.