First published: Wed Aug 25 2010(Updated: )
libsecurity in Apple Mac OS X 10.5.8 and 10.6.4 does not properly perform comparisons to domain-name strings in X.509 certificates, which allows man-in-the-middle attackers to spoof SSL servers via a certificate associated with a similar domain name, as demonstrated by use of a www.example.con certificate to spoof www.example.com.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple libsecurity | ||
Apple iOS and macOS | =10.5.8 | |
Apple iOS and macOS | =10.6.4 | |
Apple iOS and macOS | =10.5.8 | |
Apple iOS and macOS | =10.6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1802 is considered to be of high severity due to its potential for man-in-the-middle attacks.
CVE-2010-1802 can be mitigated by updating to a newer version of macOS that has addressed the vulnerability.
CVE-2010-1802 affects macOS versions 10.5.8 and 10.6.4.
CVE-2010-1802 can facilitate man-in-the-middle attacks allowing attackers to spoof SSL servers.
Users of Apple macOS 10.5.8 and 10.6.4, particularly in secure communications, are impacted by CVE-2010-1802.