First published: Thu Oct 24 2013(Updated: )
The ldapsearch command-line program in OpenLDAP in Apple Mac OS X before 10.9 does not properly process the minssf configuration setting, which allows remote attackers to obtain sensitive information by leveraging unintended weak encryption and sniffing the network.
Credit: product-security@apple.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS and macOS | <=10.8.5 | |
Apple iOS and macOS | =10.8.0 | |
Apple iOS and macOS | =10.8.1 | |
Apple iOS and macOS | =10.8.2 | |
Apple iOS and macOS | =10.8.3 | |
Apple iOS and macOS | =10.8.4 | |
Apple iOS and macOS | =10.8.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5185 has a medium severity rating, indicating a moderate risk of exploitation.
To fix CVE-2013-5185, update your Mac OS X version to 10.9 or later, which includes necessary security patches.
CVE-2013-5185 allows attackers to exploit weak encryption through network sniffing.
Users running Mac OS X versions before 10.9, specifically any version up to and including 10.8.5, are affected by CVE-2013-5185.
An attacker exploiting CVE-2013-5185 may gain access to sensitive information transmitted over weakly encrypted connections.