CVE-2011-3422
12.09.2011, 12:40
The Keychain implementation in Apple Mac OS X 10.6.8 and earlier does not properly handle an untrusted attribute of a Certification Authority certificate, which makes it easier for man-in-the-middle attackers to spoof arbitrary SSL servers via an Extended Validation certificate, as demonstrated by https access with Safari.Enginsight
Vendor | Product | Version |
---|---|---|
apple | mac_os_x | 𝑥 ≤ 10.6.8 |
apple | mac_os_x | 10.6.0 |
apple | mac_os_x | 10.6.1 |
apple | mac_os_x | 10.6.2 |
apple | mac_os_x | 10.6.3 |
apple | mac_os_x | 10.6.4 |
apple | mac_os_x | 10.6.5 |
apple | mac_os_x | 10.6.6 |
apple | mac_os_x | 10.6.7 |
apple | mac_os_x_server | 𝑥 ≤ 10.6.8 |
apple | mac_os_x_server | 10.6.0 |
apple | mac_os_x_server | 10.6.1 |
apple | mac_os_x_server | 10.6.2 |
apple | mac_os_x_server | 10.6.3 |
apple | mac_os_x_server | 10.6.4 |
apple | mac_os_x_server | 10.6.5 |
apple | mac_os_x_server | 10.6.6 |
apple | mac_os_x_server | 10.6.7 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References