First published: Thu Feb 02 2012(Updated: )
Address Book in Apple Mac OS X before 10.7.3 automatically switches to unencrypted sessions upon failure of encrypted connections, which allows remote attackers to read CardDAV data by terminating an encrypted connection and then sniffing the network.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple macOS Server | <=10.7.2 | |
Apple macOS Server | =10.7.1 | |
Apple macOS Server | =10.7.0 | |
Apple iOS and macOS | =10.7.0 | |
Apple iOS and macOS | <=10.7.2 | |
Apple iOS and macOS | =10.7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3444 has a moderate severity rating due to the potential exposure of sensitive CardDAV data.
To fix CVE-2011-3444, users should upgrade to Mac OS X 10.7.3 or later, where the issue is resolved.
CVE-2011-3444 is a vulnerability related to insecure communication through CardDAV by switching to unencrypted sessions.
CVE-2011-3444 affects users of Apple Mac OS X versions prior to 10.7.3, including certain server configurations.
Yes, CVE-2011-3444 can lead to data breaches as it allows remote attackers to read sensitive data by sniffing unencrypted sessions.