First published: Thu Nov 30 2006(Updated: )
The Security Framework in Apple Mac OS X 10.3.x up to 10.3.9 does not properly prioritize encryption ciphers when negotiating the strongest shared cipher, which causes Secure Transport to user a weaker cipher that makes it easier for remote attackers to decrypt traffic.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
macOS Yosemite | =10.3.1 | |
macOS Yosemite | =10.3.5 | |
macOS Yosemite | =10.3.2 | |
macOS Yosemite | =10.3.7 | |
macOS Yosemite | =10.3.6 | |
macOS Yosemite | =10.3.8 | |
macOS Yosemite | =10.3.4 | |
macOS Yosemite | =10.3.3 | |
macOS Yosemite | =10.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4407 is classified as a moderate severity vulnerability due to the potential for remote attackers to decrypt traffic.
To mitigate CVE-2006-4407, upgrade to a later version of Apple Mac OS X that has resolved the issue.
CVE-2006-4407 affects Apple Mac OS X versions 10.3.x up to 10.3.9.
The impact of CVE-2006-4407 is that it allows attackers to use weaker encryption ciphers, potentially exposing sensitive data to interception.
There are no confirmed workarounds for CVE-2006-4407, and the recommended resolution is to upgrade to a fixed version.