Man-in-the-middle attack vulnerability in X.509 certificate-trust implementation in Apple Mac OS XID: oval:org.secpod.oval:def:30949 | Date: (C)2015-11-06 (M)2024-02-19 |
Class: VULNERABILITY | Family: macos |
The host is installed with Apple Mac OS X or Server 10.6.8 before 10.11 and is prone to a man-in-the-middle attack vulnerability. A flaw is present in the application, which fails to properly recognize that the kSecRevocationRequirePositiveResponse flag implies a revocation-checking requirement. Successful exploitation could allow attackers to spoof endpoints by leveraging access to a revoked certificate.
Platform: |
Apple Mac OS X 10.10 |
Apple Mac OS X 10.6 |
Apple Mac OS X 10.7 |
Apple Mac OS X 10.8 |
Apple Mac OS X 10.9 |
Apple Mac OS X Server 10.10 |
Apple Mac OS X Server 10.6 |
Apple Mac OS X Server 10.7 |
Apple Mac OS X Server 10.8 |
Apple Mac OS X Server 10.9 |