cpe:/o:apple:mac_os_x:10.6.0 cpe:/o:apple:mac_os_x:10.6.1 cpe:/o:apple:mac_os_x:10.6.2 cpe:/o:apple:mac_os_x:10.6.3 cpe:/o:apple:mac_os_x:10.6.4 cpe:/o:apple:mac_os_x:10.6.5 cpe:/o:apple:mac_os_x:10.6.6 cpe:/o:apple:mac_os_x:10.6.7 cpe:/o:apple:mac_os_x:10.6.8 cpe:/o:apple:mac_os_x_server:10.6.0 cpe:/o:apple:mac_os_x_server:10.6.1 cpe:/o:apple:mac_os_x_server:10.6.2 cpe:/o:apple:mac_os_x_server:10.6.3 cpe:/o:apple:mac_os_x_server:10.6.4 cpe:/o:apple:mac_os_x_server:10.6.5 cpe:/o:apple:mac_os_x_server:10.6.6 cpe:/o:apple:mac_os_x_server:10.6.7 cpe:/o:apple:mac_os_x_server:10.6.8 CVE-2011-3422 2011-09-12T08:40:44.940-04:00 2017-08-28T21:30:11.660-04:00 4.3 NETWORK MEDIUM NONE NONE PARTIAL NONE http://nvd.nist.gov 2011-09-12T12:03:00.000-04:00 SECTRACK 1026002 BID 49429 APPLE APPLE-SA-2012-02-01-1 CONFIRM http://support.apple.com/kb/HT5130 MISC http://www.computerworld.com/s/article/9219669/Mac_OS_X_can_t_properly_revoke_dodgy_digital_certificates XF macos-keychain-sec-bypass(69556) The Keychain implementation in Apple Mac OS X 10.6.8 and earlier does not properly handle an untrusted attribute of a Certification Authority certificate, which makes it easier for man-in-the-middle attackers to spoof arbitrary SSL servers via an Extended Validation certificate, as demonstrated by https access with Safari.