SSL server spoofing vulnerability in python in Apple OS X via an arbitrary valid certificateID: oval:org.secpod.oval:def:26689 | Date: (C)2015-09-11 (M)2022-10-10 |
Class: VULNERABILITY | Family: macos |
The host is installed with Apple Mac OS X or Server 10.10.x through 10.10.4 and is prone to a SSL servers spoofing vulnerability. A flaw is present in the application, when accessing an HTTPS URL, do not (a) check the certificate against a trust store or verify that the server hostname matches a domain name in the subject's (b) Common Name or (c) subjectAltName field of the X.509 certificate. Successful exploitation allows man-in-the-middle attackers to spoof SSL servers.
Platform: |
Apple Mac OS X 10.10 |
Apple Mac OS X Server 10.10 |