{"vuid":"VU#773190","idnumber":"773190","name":"Mac OS X Safari \"Show in Finder\" option may allow arbitrary file execution","keywords":["Apple","Mac OS X","Safari","Finder","Show in Finder"],"overview":"Mac OS X Safari \"Show in Finder\" option may automatically open and execute downloaded files. This could allow an attacker to execute arbitrary code.","clean_desc":"Safari is the default web browser for Mac OS X. Safari has a \"Show in Finder\" option to allow users to automatically reveal the location of downloaded files in a Finder (the default OS X file browser) window. This feature is flawed as Finder may attempt to automatically open and execute certain types of files when the location is revealed.","impact":"An attacker may be able to execute arbitrary code since certain files may automatically open without verification of their contents.","resolution":"Apple has released a security update labeled APPLE-SA-2004-06-07 to address this issue. Information regarding the update can be found at http://docs.info.apple.com/article.html?artnum=25785.","workarounds":"","sysaffected":"","thanks":"This vulnerability was publicly reported by Apple Product Security.","author":"This document was written by Jeff Gennari.","public":["http://docs.info.apple.com/article.html?artnum=25785","http://www.osvdb.org/displayvuln.php?osvdb_id=8432"],"cveids":["CVE-2004-0539"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2004-06-08T13:07:00Z","publicdate":"2004-06-07T00:00:00Z","datefirstpublished":"2004-08-24T20:28:55Z","dateupdated":"2004-09-07T20:06:22Z","revision":121,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"1","cam_internetinfrastructure":"4","cam_population":"10","cam_impact":"6","cam_easeofexploitation":"2","cam_attackeraccessrequired":"6","cam_scorecurrent":"0.27","cam_scorecurrentwidelyknown":"0.3375","cam_scorecurrentwidelyknownexploited":"0.594","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.27,"vulnote":null}