First published: Tue Dec 31 2002(Updated: )
The default configuration of Mail.app in Mac OS X 10.0 through 10.0.4 and 10.1 through 10.1.5 sends iDisk authentication credentials in cleartext when connecting to Mac.com, which could allow remote attackers to obtain passwords by sniffing network traffic.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
macOS Yosemite | =10.0.2 | |
macOS Yosemite | =10.1 | |
macOS Yosemite | =10.0.1 | |
macOS Yosemite | =10.0.3 | |
macOS Yosemite | =10.1.4 | |
macOS Yosemite | =10.0 | |
macOS Yosemite | =10.1.3 | |
macOS Yosemite | =10.1.5 | |
macOS Yosemite | =10.1.1 | |
macOS Yosemite | =10.0.4 | |
macOS Yosemite | =10.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-2326 is considered a medium severity vulnerability due to the potential exposure of sensitive authentication credentials.
To fix CVE-2002-2326, ensure that you use a version of Mail.app in Mac OS X that has been updated to stop sending iDisk credentials in cleartext.
CVE-2002-2326 affects several versions including Mac OS X 10.0 through 10.0.4 and 10.1 through 10.1.5.
CVE-2002-2326 exposes iDisk authentication credentials, which could allow attackers to obtain user passwords.
Yes, remote attackers can exploit CVE-2002-2326 by sniffing network traffic to capture cleartext authentication credentials.