Mikuro
Crotchety UI Nitpicker
bbloke, those links raise some interesting points, but I have to disagree with them when they say this is not a problem with Safari. The deeper "problem" they examine is not much of a problem at all, because it requires the user to specifically open the file. Disguising an application as a plain ol' file is the oldest trick in the book, and there's just no way around it. Common sense neatly patches up this "security hole".
Unsanity is making too big a deal about LaunchServices. The problem, as they portray it, is that you can make these shell scripts have a JPEG icon when they're really executable. Well, you've been able to do that on the Mac for 20+ years. It's called a custom icon. Just Get Info on the file, and paste on a JPEG icon. This has exactly the same effect as the method currently used by the exploit except that it won't trigger Safari's security hole.
It's very easy on any platform to make a program look like a harmless file. Users simply need to be careful what they open. This will never change, and it is not a flaw of any OS.
I agree that what Unsanity describes is poor design (it should be per-user, not per-file), but it's not a big issue when it comes to security.
The problem here IS with Safari, because as it is set up now, simply visiting a web site and doing nothing else could lead to some unknown arbitrary program getting installed and executed. This is all because Safari is naive and doesn't use caution when identifying and opening unknown files.
Edit: I should have read the first link more thoroughly. The last bit they mention, about sending attachments with the "x-unix-mode=0755" tag set, is definitely a problem. Any file that has the executable bit set should definitely be displayed as an application in the Finder, so I agree that this is something that needs to be fixed in the OS. But this is actually a different issue that the "strong bindings" problem Unsanity is talking about.
Unsanity is making too big a deal about LaunchServices. The problem, as they portray it, is that you can make these shell scripts have a JPEG icon when they're really executable. Well, you've been able to do that on the Mac for 20+ years. It's called a custom icon. Just Get Info on the file, and paste on a JPEG icon. This has exactly the same effect as the method currently used by the exploit except that it won't trigger Safari's security hole.
It's very easy on any platform to make a program look like a harmless file. Users simply need to be careful what they open. This will never change, and it is not a flaw of any OS.
I agree that what Unsanity describes is poor design (it should be per-user, not per-file), but it's not a big issue when it comes to security.
The problem here IS with Safari, because as it is set up now, simply visiting a web site and doing nothing else could lead to some unknown arbitrary program getting installed and executed. This is all because Safari is naive and doesn't use caution when identifying and opening unknown files.
Edit: I should have read the first link more thoroughly. The last bit they mention, about sending attachments with the "x-unix-mode=0755" tag set, is definitely a problem. Any file that has the executable bit set should definitely be displayed as an application in the Finder, so I agree that this is something that needs to be fixed in the OS. But this is actually a different issue that the "strong bindings" problem Unsanity is talking about.