CVE-2006-0848

The "Open ‘safe’ files after downloading" option in Safari on Apple Mac OS X allows remote user-assisted attackers to execute arbitrary commands by tricking a user into downloading a __MACOSX folder that contains metadata (resource fork) that invokes the Terminal, which automatically interprets the script using bash, as demonstrated using a ZIP file that contains a script with a safe file extension.

Date published : 2006-02-22

http://www.securityfocus.com/bid/16736

http://www.us-cert.gov/cas/techalerts/TA06-053A.html