Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2011-3422

Overview

Vulnerability Score 4.3 4.3
CVE Id CVE-2011-3422
Last Modified 03 Feb 2012 11:01:07
Published 12 Sep 2011 08:40:44
Confidentiality Impact NONE NONE
Integrity Impact PARTIAL PARTIAL
Availability Impact NONE NONE
Access Vector NETWORK
Access Complexity MEDIUM
Authentication NONE

CVE-2011-3422

Summary

The Keychain implementation in Apple Mac OS X 10.6.8 and earlier does not properly handle an untrusted attribute of a Certification Authority certificate, which makes it easier for man-in-the-middle attackers to spoof arbitrary SSL servers via an Extended Validation certificate, as demonstrated by https access with Safari.

Vulnerable Systems

Operating System

  • Apple Mac Os X 10.6.0

  • Apple Mac Os X 10.6.1

  • Apple Mac Os X 10.6.2

  • Apple Mac Os X 10.6.3

  • Apple Mac Os X 10.6.4

  • Apple Mac Os X 10.6.5

  • Apple Mac Os X 10.6.6

  • Apple Mac Os X 10.6.7

  • Apple Mac Os X 10.6.8

  • Apple Mac Os X Server 10.6.0

  • Apple Mac Os X Server 10.6.1

  • Apple Mac Os X Server 10.6.2

  • Apple Mac Os X Server 10.6.3

  • Apple Mac Os X Server 10.6.4

  • Apple Mac Os X Server 10.6.5

  • Apple Mac Os X Server 10.6.6

  • Apple Mac Os X Server 10.6.7

  • Apple Mac Os X Server 10.6.8


References

XF - macos-keychain-sec-bypass(69556)

SECTRACK - 1026002

BID - 49429

MISC - http://www.computerworld.com/s/article/9219669/Mac_OS_X_can_t_properly_revoke_dodgy_digital_certificates

CONFIRM - http://support.apple.com/kb/HT5130

APPLE - APPLE-SA-2012-02-01-1

Related Patches

Apple 2012-02-01 Mac OS X Server 10.7.3 Update

Apple 2012-02-01 Mac OS X 10.7.3 Update

Apple 2012-02-01 Mac OS X Server 10.7.3 Combo Update

Apple 2012-02-01 Mac OS X 10.7.3 Combo Update

Apple 2012-02-01 Security Update 2012-001 v1.1 Server (Snow Leopard)

Apple 2012-02-01 Security Update 2012-001 v1.1 (Snow Leopard)


Last Updated: 27 May 2016 10:57:24