libsecurity in Apple Mac OS X 10.5.8 and 10.6.4 does not properly perform comparisons to domain-name strings in X.509 certificates, which allows man-in-the-middle attackers to spoof SSL servers via a certificate associated with a similar domain name, as demonstrated by use of a www.example.con certificate to spoof www.example.com.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
http://securitytracker.com/id?1024359 | vdb entry |
http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html | vendor advisory |
http://support.apple.com/kb/HT4312 | patch vendor advisory |