发布时间 :2004-08-06 00:00:00
修订时间 :2017-10-11 21:29:00

[原文]LaunchServices in Mac OS X 10.3.4 and 10.2.8 automatically registers and executes new applications, which could allow attackers to execute arbitrary code without warning the user.

[CNNVD]Apple Mac OS X多个安全漏洞(CNNVD-200408-060)

        LaunchServices的Mac OS X 10.3.4和10.2.8版本存在自动注册和执行新应用程序的漏洞。攻击者不警告用户就可执行任意代码。

- CVSS (基础分值)

CVSS分值: 7.5 [严重(HIGH)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/o:apple:mac_os_x:10.2.8Apple Mac OS X 10.2.8
cpe:/o:apple:mac_os_x:10.3.4Apple Mac OS X 10.3.4
cpe:/o:apple:mac_os_x_server:10.2.8Apple Mac OS X Server 10.2.8
cpe:/o:apple:mac_os_x_server:10.3.4Apple Mac OS X Server 10.3.4

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源

- 漏洞信息

Apple Mac OS X多个安全漏洞
高危 未知
2004-08-06 00:00:00 2005-10-20 00:00:00
        LaunchServices的Mac OS X 10.3.4和10.2.8版本存在自动注册和执行新应用程序的漏洞。攻击者不警告用户就可执行任意代码。

- 公告与补丁

        Apple has released a security advisory (APPLE-SA-2004-06-07) and a security update to address these issues:
        Apple Mac OS X 10.2.8
        Apple Mac OS X Server 10.2.8
        Apple Mac OS X 10.3.4
        Apple Mac OS X Server 10.3.4

- 漏洞信息 (F33508)

Apple Security Advisory 2004-06-07 (PacketStormID:F33508)
2004-06-09 00:00:00

APPLE-SA-2004-06-07 Security Update 2004-06-07 - This update delivers a number of security enhancements and is recommended for all Macintosh users. Components affected are LaunchServices, DiskImageMounter, Safari, and Terminal.

Hash: SHA1

APPLE-SA-2004-06-07 Security Update 2004-06-07


Security Update 2004-06-07 delivers a number of security enhancements
and is recommended for all Macintosh users.  The purpose of this
update is to increase security by alerting you when opening an
application for the first time via document mappings or a web address
(URL).  For more details, including a description of the new alert
dialog box, please see:

Versions:  Security Update 2004-06-07 is available for the following
system versions:
*  Mac OS X v10.3.4 "Panther"
*  Mac OS X Server v10.3.4 "Panther"
*  Mac OS X v10.2.8 "Jaguar"
*  Mac OS X Server v10.2.8 "Jaguar"

The following components are updated:

Component:   LaunchServices
CVE-ID:      CAN-2004-0538
Impact:      LaunchServices automatically registers applications,
which could be used to cause the system to run unexpected
Discussion:  LaunchServices is a system component that discovers and
opens applications.  This system component has been modified to only
open applications that have previously been explicitly run on the
system.  Attempts to run an application that has not previously been
explicitly run will result in a user alert.  Further information is
available in

Component:   DiskImageMounter
CVE-ID:      No CVE ID has been reserved as this is only an
additional preventative measure.
Impact:      The disk:// URI type mounts an anonymous remote file
system using the http protocol.
Discussion:  The registration of the disk:// URI type is removed
from the system as a preventative measure against attempts to
automatically mount remote disk image file systems.

Component:   Safari
CVE-ID:      CAN-2004-0539
Impact:      The "Show in Finder" button would open certain
files, in some cases executing downloaded applications.
Discussion:  The "Show in Finder" button will now reveal files in a
Finder window and will no longer attempt to open them.  This
modification is only available for Mac OS X v10.3.4 "Panther" and Mac
OS X Server v10.3.4 "Panther" systems as the issue does not apply to
Mac OS X v10.2.8 "Jaguar" or Mac OS X Server v10.2.8 "Jaguar".

Component:   Terminal
CVE-ID:      Not applicable
Impact:      Attempts to use a telnet:// URI with an alternate port
number fail.
Discussion:  A modification has been made to allow the specification
of an alternate port number in a telnet:// URI.  This restores
functionality that was removed with the recent fix for CAN-2004-0485.


Security Update 2004-06-07 may be obtained from:

* Software Update pane in System Preferences

* Apple's Software Downloads web site:

For Mac OS X v10.3.4 "Panther" and Mac OS X Server v10.3.4
Click on: Security Update 2004-06-07 (10.3.4)
The download file is named: "SecUpd2004-06-07Pan.dmg"
Its SHA-1 digest is: 182745485d8db3ea29ec67cb603cc5668a4f60d9

For Mac OS X v10.2.8 "Jaguar" and Mac OS X Server v10.2.8
Click on: Security Update 2004-06-07 (10.2.8)
The download file is named: "SecUpd2004-06-07Jag.dmg"
Its SHA-1 digest is: e5fa73f6a67bdcd9af76927d3416974f039b2087

Information will also be posted to the Apple Product Security
web site:

This message is signed with Apple's Product Security PGP key,
and details are available at:

Version: PGP 8.0.2

security-announce mailing list |
Do not post admin requests to the list. They will be ignored.

- 漏洞信息

Apple Mac OS X LaunchServices Code Execution
Local Access Required Other
Loss of Integrity
Exploit Unknown

- 漏洞描述

Mac OS X contains a flaw that may allow a malicious user to execute arbitrary code. The issue is triggered when LaunchServices automatically registers applications to use when opening unregistered file types, without prompting the user. With a specially crafted file and application, an attacker could trick a user into opening and executing a malicious program. It is possible that the flaw may allow arbitrary code execution resulting in a loss of integrity.

- 时间线

2004-06-07 Unknow
Unknow Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, Apple has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Apple Mac OS X Multiple Security Vulnerabilities
Unknown 10486
Yes No
2004-06-07 12:00:00 2009-07-12 05:16:00
The vendor disclosed these vulnerabilities.

- 受影响的程序版本

Apple Mac OS X Server 10.3.4
Apple Mac OS X Server 10.2.8
Apple Mac OS X 10.3.4
Apple Mac OS X 10.2.8

- 漏洞讨论

Multiple security vulnerabilities were reported in Mac OS X. A security update has been released to address these issues and provide other enhancements. The following issues were reported:

LaunchServices is reported prone to a vulnerability where the LaunchServices utility automatically registers applications. It is reported that an attacker may exploit this issue to register and run malicious applications.

DiskImageMounter is reported prone to a vulnerability where the disk:// URI handler may be used to mount an anonymous remote file system. This attack can be achieved using the HTTP protocol. A remote attacker may exploit this vulnerability to write to the local disk.

Safari is reported prone to an unspecified vulnerability where the Safari "Show in Finder" button, when invoked, would attempt to execute certain files instead of revealing the files in the finder window. An attacker may potentially exploit this condition to automatically execute files on the file system (including downloaded files). This could lead to privilege escalation or remote compromise.

Some of these issues may already be described in previous BIDs. This BID will be split up into unique BIDs when further analysis of this update is complete.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: <>.

- 解决方案

Apple has released a security advisory (APPLE-SA-2004-06-07) and a security update to address these issues:

Apple Mac OS X 10.2.8

Apple Mac OS X Server 10.2.8

Apple Mac OS X 10.3.4

Apple Mac OS X Server 10.3.4

- 相关参考