DESCRIPTION: Michael Lehn has discovered a vulnerability in Mac OS X, which can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to an error in the processing of file association meta data (stored in the "__MACOSX" folder) in ZIP archives. This can be exploited to trick users into executing a malicious shell script renamed to a safe file extension stored in a ZIP archive.
This can also be exploited automatically via the Safari browser when visiting a malicious web site.
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
I know I'm in the minority, but I enjoy using Netscape's browser ... Even after AOL got involved, I continued to surf with Netscape because that's what I've been using since college and (quite frankly) it's what I'm used to.