Full Disclosure mailing list archives

SSD Advisory – Mac OS X 10.12 Quarantine Bypass


From: Maor Shwartz <maors () beyondsecurity com>
Date: Tue, 3 Oct 2017 08:29:22 +0300

SSD Advisory – Mac OS X 10.12 Quarantine Bypass

Full report: https://blogs.securiteam.com/index.php/archives/3449
Twitter: @SecuriTeam_SSD
Weibo: SecuriTeam_SSD


Vulnerability summary
Mac OS X contains a vulnerability that allows bypassing of the Apple
Quarantine and the execution of arbitrary JavaScript code without any
restrictions.

Credit
A security researcher from WeAreSegment, Filippo Cavallarin, has reported
this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure
program.

Vendor response
Apple has been notified on the 27th of June 2017, several correspondences
were exchanged. Apple notified us that a patch has been put in place in the
upcoming High Sierra version. No additional information has been provided
by Apple since the notification that a patch has been made – no link to the
advisory nor any information on what CVE has been assigned to this have
been provided.

We have verified that Mac OS X High Sierra is no longer vulnerable to this,
a solution would be to either upgrade High Sierra, or remove the
rhtmlPlayer.html file (a workaround).

--
Thanks
Maor Shwartz
Beyond Security
GPG Key ID: 93CC36E2DE7FF514

Attachment: SSD Advisory – Mac OS X 10.pdf
Description:


_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Current thread: