First published: Mon Jun 02 2008(Updated: )
CFNetwork in Safari in Apple Mac OS X before 10.5.3 automatically sends an SSL client certificate in response to a web server's certificate request, which allows remote web sites to obtain sensitive information (Subject data) from personally identifiable certificates, and use arbitrary certificates to track user activities across domains, a related issue to CVE-2007-4879.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
macOS Yosemite | =10.4.11 | |
macOS Yosemite | =10.5 | |
macOS Yosemite | =10.5.1 | |
macOS Yosemite | =10.5.2 | |
Apple Mac OS X Server | =10.4.11 | |
Apple Mac OS X Server | =10.5 | |
Apple Mac OS X Server | =10.5.1 | |
Apple Mac OS X Server | =10.5.2 | |
Apple Safari |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1580 is considered a high severity vulnerability due to the risk of exposing sensitive information.
To fix CVE-2008-1580, update to the latest version of Apple Safari or Mac OS X that addresses this vulnerability.
CVE-2008-1580 affects personally identifiable certificates that may inadvertently be sent to unauthorized web servers.
CVE-2008-1580 primarily affects older versions of Apple Safari prior to security updates that mitigated this vulnerability.
CVE-2008-1580 is not a concern for users of newer macOS versions that have applied the necessary security patches.