Vulnerability Description
The SSL implementation in Apple Safari before 5.1.1 on Mac OS X before 10.7 accesses uninitialized memory during the processing of X.509 certificates, which allows remote web servers to execute arbitrary code via a crafted certificate.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Safari | All versions |
| Apple | Mac Os X | <= 10.6.8 |
| Apple | Mac Os X Server | <= 10.6.8 |
Related Weaknesses (CWE)
References
- http://lists.apple.com/archives/Security-announce/2011//Oct/msg00004.htmlVendor Advisory
- http://osvdb.org/76390
- http://support.apple.com/kb/HT5000Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/70568
- http://lists.apple.com/archives/Security-announce/2011//Oct/msg00004.htmlVendor Advisory
- http://osvdb.org/76390
- http://support.apple.com/kb/HT5000Vendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/70568
FAQ
What is CVE-2011-3231?
CVE-2011-3231 is a vulnerability with a CVSS score of 6.8 (MEDIUM). The SSL implementation in Apple Safari before 5.1.1 on Mac OS X before 10.7 accesses uninitialized memory during the processing of X.509 certificates, which allows remote web servers to execute arbitr...
How severe is CVE-2011-3231?
CVE-2011-3231 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-3231?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Safari, Apple Mac Os X, Apple Mac Os X Server.