First published: Thu Jan 27 2005(Updated: )
ServerAdmin in Mac OS X 10.2.8 through 10.3.5 uses the same example self-signed certificate on each system, which allows remote attackers to decrypt sessions.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CUPS (Common UNIX Printing System) | =1.1.19_rc5 | |
CUPS (Common UNIX Printing System) | =1.1.10 | |
CUPS (Common UNIX Printing System) | =1.1.16 | |
CUPS (Common UNIX Printing System) | =1.1.7 | |
CUPS (Common UNIX Printing System) | =1.0.4_8 | |
CUPS (Common UNIX Printing System) | =1.1.15 | |
CUPS (Common UNIX Printing System) | =1.1.21 | |
CUPS (Common UNIX Printing System) | =1.1.13 | |
CUPS (Common UNIX Printing System) | =1.1.17 | |
CUPS (Common UNIX Printing System) | =1.1.4_3 | |
CUPS (Common UNIX Printing System) | =1.1.4 | |
CUPS (Common UNIX Printing System) | =1.1.12 | |
CUPS (Common UNIX Printing System) | =1.1.4_5 | |
CUPS (Common UNIX Printing System) | =1.1.1 | |
CUPS (Common UNIX Printing System) | =1.1.20 | |
CUPS (Common UNIX Printing System) | =1.1.18 | |
CUPS (Common UNIX Printing System) | =1.1.19 | |
CUPS (Common UNIX Printing System) | =1.0.4 | |
CUPS (Common UNIX Printing System) | =1.1.14 | |
CUPS (Common UNIX Printing System) | =1.1.4_2 | |
CUPS (Common UNIX Printing System) | =1.1.6 | |
Apple macOS Server | =10.3.2 | |
Apple iOS and macOS | =10.2.5 | |
Apple macOS Server | =10.2.2 | |
Apple iOS and macOS | =10.2.7 | |
Apple iOS and macOS | =10.2.8 | |
Apple macOS Server | =10.2.4 | |
Apple iOS and macOS | =10.2.1 | |
Apple macOS Server | =10.3.5 | |
Apple iOS and macOS | =10.3.1 | |
Apple iOS and macOS | =10.3.5 | |
Apple macOS Server | =10.3.3 | |
Apple macOS Server | =10.2.7 | |
Apple macOS Server | =10.2.3 | |
Apple iOS and macOS | =10.2.4 | |
Apple macOS Server | =10.3.4 | |
Apple iOS and macOS | =10.3.2 | |
Apple iOS and macOS | =10.2.2 | |
Apple macOS Server | =10.2.5 | |
Apple macOS Server | =10.3 | |
Apple macOS Server | =10.2.6 | |
Apple macOS Server | =10.2 | |
Apple macOS Server | =10.2.1 | |
Apple macOS Server | =10.3.1 | |
Apple iOS and macOS | =10.3.4 | |
Apple iOS and macOS | =10.3.3 | |
Apple iOS and macOS | =10.2.6 | |
Apple iOS and macOS | =10.2.3 | |
Apple macOS Server | =10.2.8 | |
Apple iOS and macOS | =10.2 | |
Apple iOS and macOS | =10.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0927 is considered to have a moderate severity due to the potential for session decryption by remote attackers.
To fix CVE-2004-0927, update to a later version of Mac OS X or the CUPS software that does not use the same self-signed certificate.
CVE-2004-0927 affects various versions of CUPS from 1.0.4 to 1.1.21 and Mac OS X versions from 10.2.8 to 10.3.5.
CVE-2004-0927 is a cryptographic flaw that allows attackers to decrypt data transmitted during printing sessions.
Yes, CVE-2004-0927 specifically impacts Mac OS X 10.2.8 through 10.3.5 installations where CUPS is used.