Vulnerability Description
The TLS Handshake Protocol implementation in Secure Transport in Apple OS X before 10.11 accepts a Certificate Request message within a session in which no Server Key Exchange message has been sent, which allows remote attackers to have an unspecified impact via crafted TLS data.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apple | Mac Os X | <= 10.10.5 |
Related Weaknesses (CWE)
References
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.htmlVendor Advisory
- http://www.securityfocus.com/bid/76908
- http://www.securitytracker.com/id/1033703
- https://support.apple.com/HT205267Vendor Advisory
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.htmlVendor Advisory
- http://www.securityfocus.com/bid/76908
- http://www.securitytracker.com/id/1033703
- https://support.apple.com/HT205267Vendor Advisory
FAQ
What is CVE-2015-5887?
CVE-2015-5887 is a vulnerability with a CVSS score of 10.0 (HIGH). The TLS Handshake Protocol implementation in Secure Transport in Apple OS X before 10.11 accepts a Certificate Request message within a session in which no Server Key Exchange message has been sent, w...
How severe is CVE-2015-5887?
CVE-2015-5887 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-5887?
Check the references section above for vendor advisories and patch information. Affected products include: Apple Mac Os X.