First published: Thu Aug 06 2009(Updated: )
CFNetwork in Apple Mac OS X 10.5 before 10.5.8 places an incorrect URL in a certificate warning in certain 302 redirection scenarios, which makes it easier for remote attackers to trick a user into visiting an arbitrary https web site by leveraging an open redirect vulnerability, a different issue than CVE-2009-2062.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS and macOS | =10.5.2-2008-002 | |
Apple macOS Server | =10.5.2 | |
Apple iOS and macOS | =10.5.6 | |
Apple iOS and macOS | =10.5.5 | |
Apple macOS Server | =10.5.5 | |
Apple iOS and macOS | =10.5.1 | |
Apple macOS Server | =10.5.1 | |
Apple macOS Server | =10.5.6 | |
Apple iOS and macOS | =10.5.3 | |
Apple iOS and macOS | =10.5.0 | |
Apple macOS Server | =10.5.0 | |
Apple macOS Server | =10.5.3 | |
Apple iOS and macOS | =10.5 | |
Apple macOS Server | =10.5.4 | |
Apple iOS and macOS | =10.5.2 | |
Apple macOS Server | =10.5.7 | |
Apple iOS and macOS | =10.5.6 | |
Apple iOS and macOS | =10.5.7 | |
Apple macOS Server | =10.5 | |
Apple iOS and macOS | =10.5.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2009-1723 is classified as moderate.
To fix CVE-2009-1723, Apple recommends updating to Mac OS X 10.5.8 or later.
CVE-2009-1723 affects Apple Mac OS X versions 10.5 through 10.5.7.
CVE-2009-1723 is a vulnerability that relates to improper URL handling in certificate warnings.
Yes, CVE-2009-1723 can make users susceptible to phishing attacks by misleading them about the actual URL.