First published: Thu Oct 24 2013(Updated: )
The auto-configuration feature in Mail in Apple Mac OS X before 10.9 selects plaintext authentication for unspecified servers that support CRAM-MD5 authentication, which allows remote attackers to obtain sensitive information by sniffing the network.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
macOS Yosemite | <=10.8.5 | |
macOS Yosemite | =10.8.0 | |
macOS Yosemite | =10.8.1 | |
macOS Yosemite | =10.8.2 | |
macOS Yosemite | =10.8.3 | |
macOS Yosemite | =10.8.4 | |
macOS Yosemite | =10.8.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5181 is considered a medium severity vulnerability due to the potential exposure of sensitive information.
To fix CVE-2013-5181, users should update their Mac OS X to version 10.9 or later, which addresses this vulnerability.
CVE-2013-5181 affects Mail in Apple Mac OS X versions prior to 10.9 and enables plaintext authentication in certain scenarios.
CVE-2013-5181 allows remote attackers to sniff the network and obtain sensitive information due to improper authentication methods.
The impact of CVE-2013-5181 on users can result in the compromise of sensitive information transmitted over the network.