Apple Finder fails to properly handle malformed .DS_Store files. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code.
.DS_Store files are hidden files used by Apple Finder to control the display of a folder and its contents.
According to Apple Security Advisory 2006-007:
_A heap buffer overflow may be triggered when the Finder is used to browse a directory containing a corrupt ".DS_Store" file. By enticing a user to browse a directory containing a maliciously-crafted ".DS_Store" file, an attacker may be able to trigger the overflow. This could lead to an application crash or arbitrary code execution with the privileges of the user running Finder. ".DS_Store" files may be included in archives, on disk images, and on network file systems. _
A remote, unauthenticated attacker may be able to execute arbitrary code with the privileges of the user running Apple Finder.
Apply Apple Updates
Apple advises all users to apply Apple Security Update 2006-007, as it fixes this and other critical security flaws.
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Vendor has issued information
__ Sort by: Status Alphabetical
Affected Unknown __ Unaffected
Updated: November 29, 2006
No statement is currently available from the vendor regarding this vulnerability.
The vendor has not provided us with any further information regarding this vulnerability.
Refer to <http://docs.info.apple.com/article.html?artnum=304829>.
If you have feedback, comments, or additional information about this vulnerability, please send us email.
Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | | N/A
This vulnerability was reported in Apple Security Update 2006-007
This document was written by Jeff Gennari based on information from Apple
CVE IDs: | CVE-2006-4402
Severity Metric:** | 26.33
Date Public: | 2006-11-28
Date First Published: | 2006-11-29
Date Last Updated: | 2006-11-30 16:33 UTC
Document Revision: | 31