Vulnerability Description
The User Documentation component in Apple Mac OS X through 10.6.8 uses http sessions for updates to App Store help information, which allows man-in-the-middle attackers to execute arbitrary code by spoofing the http server.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Mac Os X | <= 10.6.8 |
| Apple | Mac Os X Server | <= 10.6.8 |
References
- http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.htmlVendor Advisory
- http://osvdb.org/76375
- http://support.apple.com/kb/HT5002Vendor Advisory
- http://www.securityfocus.com/bid/50085
- http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.htmlVendor Advisory
- http://osvdb.org/76375
- http://support.apple.com/kb/HT5002Vendor Advisory
- http://www.securityfocus.com/bid/50085
FAQ
What is CVE-2011-3224?
CVE-2011-3224 is a vulnerability with a CVSS score of 2.6 (LOW). The User Documentation component in Apple Mac OS X through 10.6.8 uses http sessions for updates to App Store help information, which allows man-in-the-middle attackers to execute arbitrary code by sp...
How severe is CVE-2011-3224?
CVE-2011-3224 has been rated LOW with a CVSS base score of 2.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-3224?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Mac Os X, Apple Mac Os X Server.