First published: Thu Oct 24 2013(Updated: )
Mail in Apple Mac OS X before 10.9 allows remote attackers to spoof the existence of a cryptographic signature for an e-mail message by using the multipart/signed content type within an unsigned message.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS and macOS | <=10.8.5 | |
Apple iOS and macOS | =10.8.0 | |
Apple iOS and macOS | =10.8.1 | |
Apple iOS and macOS | =10.8.2 | |
Apple iOS and macOS | =10.8.3 | |
Apple iOS and macOS | =10.8.4 | |
Apple iOS and macOS | =10.8.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5182 is considered to have a moderate severity level as it allows remote attackers to impersonate a trusted source.
To fix CVE-2013-5182, upgrade to Mac OS X version 10.9 or later, which includes the security patch.
CVE-2013-5182 facilitates a spoofing attack through the use of multipart/signed content in unsigned email messages.
CVE-2013-5182 affects all versions of Mac OS X before 10.9, specifically 10.8.x and prior versions.
There are no recommended workarounds for CVE-2013-5182; updating to a non-vulnerable version is the best practice.