[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96125

 
 

909

 
 

78020

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2011-3422

Date: (C)2011-09-12   (M)2017-08-29
 
CVSS Score: 4.3Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 2.9Authentication: NONE
 Confidentiality: NONE
 Integrity: PARTIAL
 Availability: NONE











The Keychain implementation in Apple Mac OS X 10.6.8 and earlier does not properly handle an untrusted attribute of a Certification Authority certificate, which makes it easier for man-in-the-middle attackers to spoof arbitrary SSL servers via an Extended Validation certificate, as demonstrated by https access with Safari.

Reference:
SECTRACK-1026002
BID-49429
APPLE-SA-2012-02-01-1
http://support.apple.com/kb/HT5130
http://www.computerworld.com/s/article/9219669/Mac_OS_X_can_t_properly_revoke_dodgy_digital_certificates
macos-keychain-sec-bypass(69556)

CPE    18
cpe:/o:apple:mac_os_x_server:10.6.5
cpe:/o:apple:mac_os_x_server:10.6.8
cpe:/o:apple:mac_os_x_server:10.6.7
cpe:/o:apple:mac_os_x_server:10.6.6
...
CWE    1
CWE-20
OVAL    2
oval:org.secpod.oval:def:3900
oval:org.secpod.oval:def:3930

© 2013 SecPod Technologies