Feeds

Two years later, Apple Safari still open to 'carpet-bombing'

Unlike most 'sane' browsers

Internet Security Threat Report 2014

After more than two years, Apple's Safari browser for Macs remains vulnerable to attacks that allow websites to litter a user's hard drive with thousands of malicious files.

The "carpet bomb" vulnerability was publicly disclosed in May 2008 after members of Apple's security team said they didn't consider the quirk a security issue. After Microsoft took the unusual step of advising its customers to stop using Safari, Apple issued a patch Windows versions but not for OS X.

"This means that if you use the Safari browser on OSX, a malicious entity can drop any amount of binaries or data files into your ~/Downloads/ folder," Nitesh Dhanjani, the researcher who credited with discovering the vulnerability, wrote over the weekend.

"This issue is caused because, while most sane web browsers warn the end user and ask for explicit permission before saving a file locally, Safari goes ahead and saves the file into the default download location without asking the user - even if hundreds of files are served up by the malicious website simultaneously."

Apple's dismissal of the advisory probably has something to do with the requirement that users would have to double click on the downloaded file and enter an administrative password before their machines could be hijacked. But as Dhanjani points out, in a world in which state-sponsored attacks and corporate espionage are par for the course, it's never a good idea for outsiders to be able to control the files that are downloaded onto a user's computer.

In the two years since the flaw was disclosed, Mozilla Firefox and Google Chrome have been updated to protect its users. But so far, while Apple's security has agreed that it might be good if Safari actually checked with the user before downloading potentially unwanted files, it has said only that a fix "could take quite a while, if it ever gets incorporated."

It appears they were true to their word. ®

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.