Apple '.DS Store' |
Weakness ID: 71 (Weakness Variant) | Status: Incomplete |
Description Summary
Software operating in a MAC OS environment, where .DS_Store is in effect, must carefully manage hard links, otherwise an attacker may be able to leverage a hard link from .DS_Store to overwrite arbitrary files and gain privileges.
Reference | Description |
---|---|
BUGTRAQ:20010910 | More security problems in Apache on Mac OS X |
CVE-2005-0342 | The Finder in Mac OS X and earlier allows local users to overwrite arbitrary files and gain privileges by creating a hard link from the .DS Store file to an arbitrary file. |
Nature | Type | ID | Name | View(s) this relationship pertains to![]() |
---|---|---|---|---|
ChildOf | ![]() | 66 | Improper Handling of File Names that Identify Virtual Resources | Research Concepts (primary)1000 |
ChildOf | ![]() | 70 | Mac Virtual File Problems | Resource-specific Weaknesses (primary)631 Development Concepts (primary)699 |
PeerOf | ![]() | 62 | UNIX Hard Link | Research Concepts1000 |
This entry, which originated from PLOVER, probably stems from a common manipulation that is used to exploit symlink and hard link following weaknesses, like /etc/passwd is often used for UNIX-based exploits. As such, it is probably too low-level for inclusion in CWE. |
Submissions | ||||
---|---|---|---|---|
Submission Date | Submitter | Organization | Source | |
PLOVER | Externally Mined | |||
Modifications | ||||
Modification Date | Modifier | Organization | Source | |
2008-07-01 | Eric Dalci | Cigital | External | |
updated Time of Introduction | ||||
2008-09-08 | CWE Content Team | MITRE | Internal | |
updated Relationships, Taxonomy Mappings | ||||
2008-10-14 | CWE Content Team | MITRE | Internal | |
updated Maintenance Notes | ||||
2009-03-10 | CWE Content Team | MITRE | Internal | |
updated Related Attack Patterns |