<p>CVE : CVE-2014-8826<br></p><p>Gatekeeper is a feature available in OS X Lion v10.7.5 and later</p><p>versions of OS X.</p><p> </p><p>Gatekeeper performs checks on files and applications downloaded from the</p><p>Internet to prevent execution of supposedly malicious and</p><p>untrusted/unsigned code.</p><p> </p><p>Gatekeeper provides three different settings:</p><p> </p><p>- Mac App Store (Only apps that came from the Mac App Store can open)</p><p>- Mac App Store and identified developers (Only apps that came from the</p><p>Mac App Store and identified developers using Gatekeeper can open)</p><p>- Anywhere</p><p> </p><p>The default setting is "Mac App Store and identified developers".</p><p> </p><p>This setting prevents execution of any code that was not downloaded from</p><p>the Mac App Store and that was not digitally signed by a Developer ID</p><p>registered with Apple.</p><p> </p><p>For example, If the user downloads an application from an untrusted</p><p>source and double-clicks on the application to execute it, OS X</p><p>Gatekeeper will prevent its execution with the following warning message:</p><p> </p><p>"<AppName> can't be opened because it is from an unidentified developer."</p><p> </p><p>(For more information on OS X Gatekeeper, see</p><p><a href="http://support.apple.com/kb/ht5290" rel="nofollow">http://support.apple.com/kb/ht5290</a>)</p><p> </p><p>We found an attacker can bypass OS X Gatekeeper protections and execute</p><p>unsigned malicious code downloaded by the user, even if OS X Gatekeeper</p><p>is configured to only allow execution of applications downloaded from</p><p>the Mac App Store (the highest security setting).</p>
暂无评论