First published: Wed Jun 10 2009(Updated: )
Apple Safari before 4.0 does not properly check for revoked Extended Validation (EV) certificates, which makes it easier for remote attackers to trick a user into accepting an invalid certificate.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Mobile Safari | =3.1.2 | |
Apple Mobile Safari | =3.2.1 | |
Apple Mobile Safari | =0.9 | |
Apple Mobile Safari | =1.3.2 | |
Apple Mobile Safari | =1.2 | |
Apple Mobile Safari | =3.0.4 | |
Apple Mobile Safari | =3.0.3 | |
Apple Mobile Safari | =1.3.1 | |
Apple Mobile Safari | =2.0.4 | |
Apple Mobile Safari | =3.0 | |
Apple Mobile Safari | =3.2.3 | |
Apple Mobile Safari | =1.1 | |
Apple Mobile Safari | <=4.0_beta | |
Apple Mobile Safari | =3.1 | |
Apple Mobile Safari | =2.0 | |
Apple Mobile Safari | =3.0.2 | |
Apple Mobile Safari | =1.0.3 | |
Apple Mobile Safari | =1.0 | |
Apple Mobile Safari | =2.0.2 | |
Apple Mobile Safari | =3.1.1 | |
Apple Mobile Safari | =1.3 | |
Apple Mobile Safari | =0.8 | |
Apple Mobile Safari | =3.2 | |
Apple Mobile Safari | =3.0.3 | |
Apple Mobile Safari | =3.0.1 | |
Apple Mobile Safari | =3.1.2 | |
Apple Mobile Safari | <=3.2.3 | |
Apple Mobile Safari | =3.0.2 | |
Apple Mobile Safari | =3.1 | |
Apple Mobile Safari | =3.1.1 | |
Apple Mobile Safari | =3.0 | |
Apple Mobile Safari | =3.2.2 | |
Apple Mobile Safari | =3.2.1 | |
Apple Mobile Safari | =3.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1682 is considered a moderate severity vulnerability due to its potential for abuse in phishing attacks.
CVE-2009-1682 affects Apple Safari by failing to properly check for revoked Extended Validation (EV) certificates.
The resolution for CVE-2009-1682 is to update Apple Safari to version 4.0 or later, where the vulnerability is patched.
CVE-2009-1682 affects all versions of Apple Safari prior to 4.0, including versions 1.0 through 3.2.
CVE-2009-1682 could be exploited through man-in-the-middle attacks that use invalid certificates, potentially leading to data interception.