CVE-2011-0189
23.03.2011, 02:00
The default configuration of Terminal in Apple Mac OS X 10.6 before 10.6.7 uses SSH protocol version 1 within the New Remote Connection dialog, which might make it easier for man-in-the-middle attackers to spoof SSH servers by leveraging protocol vulnerabilities.Enginsight
Vendor | Product | Version |
---|---|---|
apple | terminal | * |
apple | mac_os_x | 10.6.0 |
apple | mac_os_x | 10.6.1 |
apple | mac_os_x | 10.6.2 |
apple | mac_os_x | 10.6.3 |
apple | mac_os_x | 10.6.4 |
apple | mac_os_x | 10.6.5 |
apple | mac_os_x | 10.6.6 |
apple | terminal | * |
apple | mac_os_x_server | 10.6.0 |
apple | mac_os_x_server | 10.6.1 |
apple | mac_os_x_server | 10.6.2 |
apple | mac_os_x_server | 10.6.3 |
apple | mac_os_x_server | 10.6.4 |
apple | mac_os_x_server | 10.6.5 |
apple | mac_os_x_server | 10.6.6 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration