“A vulnerability in the way macOS processes.
The crafted files can then be attached to (or linked in) malicious emails, researchers added – and if users are socially engineered into clicking on them, those commands embedded inside automatically execute in stealth mode, with no alert or prompt given to victims. Inetloc files can be specially crafted to contain embedded commands. Inetloc files are Apple-specific, and function as shortcuts to internet locations, such as an RSS feed or a telnet location or they can be used to open documents locally on someone’s Mac within a browser using the “file://” format (in place of It’s the latter function that’s at issue with the zero day, researchers said. It’s the overlord application for everything else on the Mac, in other words.Īccording to an SSD Secure Disclosure advisory this week, the vulnerability exists in the way macOS Finder handles.
It’s the first thing users see upon booting, and it governs the launching of other applications and the overall user management of files, disks and network volumes. A zero-day security vulnerability in Apple’s macOS Finder system could allow remote attackers to trick users into running arbitrary commands, according to researchers – and a silent patch hasn’t fixed it.įor those not in the Apple camp, the macOS Finder is the default file manager and GUI front-end used on all Macintosh operating systems.