Microsoft increases pressure on Apple to fix Safari blended threat

Posted by   Virus Bulletin on   Jun 3, 2008

'Carpet bombing' vulnerability more serious than Apple claims, MS warns.

Microsoft, whose Internet Explorer has come under frequent criticism for security vulnerabilities, has issued a security advisory alerting users of arch-rival Apple's Safari browser to a potential security threat.

The issue is a blended threat which combines quirks in both the Apple browser product and the Windows desktop, and can lead Safari users to seeing their desktops plastered with files and possibly risk execution of unwanted software, if maliciously crafted sites are browsed to.

The Safari browser lacks user controls over downloading of content, which can lead to the desktop being peppered with files as instructions on web pages are obeyed without question. It would not be difficult, researchers have argued, to attach fake icons to downloaded executables and trick users into executing them in the belief that they are innocent files or system staples such as 'My Computer'.

Apple's reported response to queries from Nitesh Dhanjani, the researcher who spotted the flaw, included the assertion that they are 'not treating this as a security issue'. This attitude caused considerable outcry when the issue first emerged two weeks ago, and now Microsoft has heightened awareness of the danger and advised users of Safari on Windows platforms to minimise their use of the browser until a fix is released. Currently, this is not expected to come from Apple at least until the next full version of Safari, due by September, but the wording of the Microsoft alert hinted that they may possibly implement their own means of reducing the danger at some point should Apple fail to do so.

Apple and Safari have recently been embroiled in security controversy after the browser was included as an unsolicited part of the Apple update system. Nitesh Dhajani's original alert on the 'carpet bombing' problem is here, and Microsoft's advisory to users is here.

Posted on 03 June 2008 by Virus Bulletin

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.

VB2021 localhost is over, but the content is still available to view!

VB2021 localhost - VB's second virtual conference - took place last week, but you can still watch all the presentations.

VB2021 localhost call for last-minute papers

The call for last-minute papers for VB2021 localhost is now open. Submit before 20 August to have your paper considered for one of the slots reserved for 'hot' research!

New article: Run your malicious VBA macros anywhere!

Kurt Natvig explains how he recompiled malicious VBA macro code to valid harmless Python 3.x code.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.