First published: Wed Mar 05 2014(Updated: )
A certain Apple patch for OpenSSL in Apple OS X 10.9.2 and earlier uses a Trust Evaluation Agent (TEA) feature without terminating certain TLS/SSL handshakes as specified in the SSL_CTX_set_verify callback function's documentation, which allows remote attackers to bypass extra verification within a custom application via a crafted certificate chain that is acceptable to TEA but not acceptable to that application.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apple iOS and macOS | <=10.9.2 | |
<=10.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2234 has a severity rating of medium, making it a notable security risk for affected systems.
To fix CVE-2014-2234, upgrade to a version of macOS later than 10.9.2 that includes the security update addressing this vulnerability.
CVE-2014-2234 affects Apple OS X versions up to and including 10.9.2.
CVE-2014-2234 is a security vulnerability in the Trust Evaluation Agent within OpenSSL that allows for potential bypass of certain verification processes.
Yes, CVE-2014-2234 allows remote attackers to exploit the vulnerability without requiring local access.