A critical vulnerability in MacKeeper, a controversial security program for Mac computers, could let attackers execute malicious commands on Macs when their owners visit specially crafted Web pages.
MacKeeper’s developers acknowledged the recently discovered problem and released a fix for it Friday, saying in a blog post that users should run MacKeeper Update Tracker and install version 3.4.1 or later. [Editor’s note: We have instructions on how to uninstall the MacKeeper app and how to stop MacKeeper notifications from appearing in Safari.]
MacKeeper registers itself as the handler for a custom URL scheme, allowing websites to automatically call the application through the browser.
Researcher Braden Thomas found an issue in the program’s validation of such URLs that makes it possible for attackers to execute arbitrary commands with root privilege when MacKeeper users visit a specially crafted website in Safari. As a proof of concept, he posted a link on Twitter that automatically executes a command to remove MacKeeper when clicked.
If users have already been asked by MacKeeper for their password during the normal operation of the program, the rogue command will execute automatically. If not, the program will prompt them for their password, but the text on the dialog window can also be altered by the exploit, SecureMac reported.
Read the Full Article: Source – PC World