Vulnerability Description
libsecurity in Apple Mac OS X 10.5.8 and 10.6.4 does not properly perform comparisons to domain-name strings in X.509 certificates, which allows man-in-the-middle attackers to spoof SSL servers via a certificate associated with a similar domain name, as demonstrated by use of a www.example.con certificate to spoof www.example.com.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Libsecurity | All versions |
| Apple | Mac Os X | 10.5.8 |
| Apple | Mac Os X Server | 10.5.8 |
Related Weaknesses (CWE)
References
- http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.htmlVendor Advisory
- http://securitytracker.com/id?1024359
- http://support.apple.com/kb/HT4312PatchVendor Advisory
- http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.htmlVendor Advisory
- http://securitytracker.com/id?1024359
- http://support.apple.com/kb/HT4312PatchVendor Advisory
FAQ
What is CVE-2010-1802?
CVE-2010-1802 is a vulnerability with a CVSS score of 6.4 (MEDIUM). libsecurity in Apple Mac OS X 10.5.8 and 10.6.4 does not properly perform comparisons to domain-name strings in X.509 certificates, which allows man-in-the-middle attackers to spoof SSL servers via a ...
How severe is CVE-2010-1802?
CVE-2010-1802 has been rated MEDIUM with a CVSS base score of 6.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-1802?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Libsecurity, Apple Mac Os X, Apple Mac Os X Server.