DirectoryServices in MacOS X trusts the PATH environment variable to locate and execute the touch command, which allows local users to execute arbitrary commands by modifying the PATH to point to a directory containing a malicious touch program.Referenceshttp://www.atstake.com/research/advisories/2003/a041003-1.txthttp://lists.apple.com/mhonarc/security-announce/msg00028.html