Man-in-the-middle vulnerability in the SSL and TLS protocols in Apple Mac OS XID: oval:org.secpod.oval:def:3506 | Date: (C)2011-11-21 (M)2024-02-19 |
Class: VULNERABILITY | Family: macos |
The host is installed with Apple Mac OS X 10.5.8 or 10.6.2 and is prone to an man-in-the-middle vulnerability. A flaw is present in the applications, which fail to handle properly associate renegotiation handshakes with an existing connection. Successful exploitation could allow attackers to attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL.
Platform: |
Apple Mac OS 14 |
Apple Mac OS 13 |
Apple Mac OS 12 |
Apple Mac OS 11 |
Apple Mac OS X 10.15 |
Apple Mac OS X 10.14 |
Apple Mac OS X 10.12 |
Apple Mac OS X 10.13 |
Apple Mac OS X 10.5 |
Apple Mac OS X Server 10.5 |
Apple Mac OS X 10.6 |
Apple Mac OS X Server 10.6 |
Apple Mac OS X 10.7 |
Apple Mac OS X Server 10.7 |
Apple Mac OS X 10.8 |
Apple Mac OS X Server 10.8 |
Apple Mac OS X 10.9 |
Apple Mac OS X Server 10.9 |
Apple Mac OS X 10.10 |
Apple Mac OS X Server 10.10 |