Vulnerability Description
The default configuration of Terminal in Apple Mac OS X 10.6 before 10.6.7 uses SSH protocol version 1 within the New Remote Connection dialog, which might make it easier for man-in-the-middle attackers to spoof SSH servers by leveraging protocol vulnerabilities.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Terminal | All versions |
| Apple | Mac Os X | 10.6.0 |
| Apple | Mac Os X Server | 10.6.0 |
Related Weaknesses (CWE)
References
- http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.htmlPatchVendor Advisory
- http://support.apple.com/kb/HT4581PatchVendor Advisory
- http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.htmlPatchVendor Advisory
- http://support.apple.com/kb/HT4581PatchVendor Advisory
FAQ
What is CVE-2011-0189?
CVE-2011-0189 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The default configuration of Terminal in Apple Mac OS X 10.6 before 10.6.7 uses SSH protocol version 1 within the New Remote Connection dialog, which might make it easier for man-in-the-middle attacke...
How severe is CVE-2011-0189?
CVE-2011-0189 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-0189?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Terminal, Apple Mac Os X, Apple Mac Os X Server.