First published: Fri Oct 14 2011(Updated: )
CalDAV in Apple iOS before 5 does not validate X.509 certificates for SSL sessions, which allows man-in-the-middle attackers to spoof calendar servers and obtain sensitive information via an arbitrary certificate.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iPhone OS | =4.0 | |
Apple iPhone OS | =4.3.2 | |
Apple iPhone OS | =4.0.2 | |
Apple iPhone OS | =4.0.1 | |
Apple iPhone OS | =3.2 | |
Apple iPhone OS | =4.2.8 | |
Apple iPhone OS | =4.1 | |
Apple iPhone OS | =3.1.2 | |
Apple iPhone OS | =4.3.5 | |
Apple iPhone OS | =3.1.3 | |
Apple iPhone OS | =4.3.1 | |
Apple iPhone OS | =4.2.5 | |
Apple iPhone OS | =3.2.1 | |
Apple iPhone OS | =3.1 | |
Apple iPhone OS | =4.3.5 | |
Apple iPhone OS | =3.1 | |
Apple iPhone OS | =3.2 | |
Apple iPhone OS | =4.3.5 | |
Apple iPhone OS | =4.2.1 | |
Apple iPhone OS | =3.0 | |
Apple iPhone OS | =4.0.1 | |
Apple iPhone OS | =4.3.3 | |
Apple iPhone OS | =4.0.1 | |
Apple iPhone OS | =4.0 | |
Apple iPhone OS | =3.1 | |
Apple iPhone OS | =4.0 | |
Apple iPhone OS | =4.3.0 | |
Apple iPhone OS | =3.2.1 | |
Apple iPhone OS | =3.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2011-3253 is considered to be moderate as it allows man-in-the-middle attacks on users without proper SSL certificate validation.
To fix CVE-2011-3253, upgrade your iOS to version 5 or later where this vulnerability has been addressed.
CVE-2011-3253 affects Apple iOS versions prior to 5, including 3.0 through 4.3.5.
CVE-2011-3253 enables man-in-the-middle attacks, allowing attackers to spoof calendar servers and intercept sensitive information.
If you cannot upgrade, avoid using unsecured networks and ensure all calendar server connections use trusted sources with valid certificates.