![]() ![]() The fix is simple – apply the latest updates from Apple. ![]() Essentially, you leverage a flaw in the Safari browser to get it to unload a crafted archive file causing the quarantine bit to _NOT_ be set, which then bypasses the gatekeeper functions which prompt for permission prior to allowing execution of such a file. ![]() After installing, type 'exiftool' in a Terminal window to run exiftool and read the application documentation.Read the installation instructions for help installing ExifTool on Windows, MacOS and Unix systems. Started by klvnstudios, Today at 02:05:39 AM. The MacOS package installs the ExifTool command-line application and libraries in /usr/local/bin. The flaw was fixed in macOS 12.5, released July 2022. The 'exiftool' Application Mac OS Inspector Tag Field Mac OS Inspector Tag Field.Jamf found the Archive Utility vulnerability after detecting a flaw in Safari that could circumvent Gatekeeper checks earlier this year and decided to “research other archiving features that might suffer from similar issues.” Jamf notified Apple about the issue on the flaw was fixed in July. Researchers at Jamf Threat Labs have discovered a remote code execution vulnerability in macOS Archive Utility. ![]()
0 Comments
Leave a Reply. |