First published: Wed Aug 25 2010(Updated: )
libsecurity in Apple Mac OS X 10.5.8 and 10.6.4 does not properly perform comparisons to domain-name strings in X.509 certificates, which allows man-in-the-middle attackers to spoof SSL servers via a certificate associated with a similar domain name, as demonstrated by use of a www.example.con certificate to spoof www.example.com.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple Libsecurity | ||
Apple Mac OS X | =10.5.8 | |
Apple Mac OS X | =10.6.4 | |
Apple Mac OS X Server | =10.5.8 | |
Apple Mac OS X Server | =10.6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.