The X.509 certificate-trust implementation in Apple iOS before 9.1 does not recognize that the kSecRevocationRequirePositiveResponse flag implies a revocation-checking requirement, which makes it easier for man-in-the-middle attackers to spoof endpoints by leveraging access to a revoked certificate.
Software security is not security software. Here we're concerned with topics like authentication, access control, confidentiality, cryptography, and privilege management.
Link | Tags |
---|---|
http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html | vendor advisory |
http://lists.apple.com/archives/security-announce/2015/Dec/msg00002.html | vendor advisory |
https://support.apple.com/HT205370 | vendor advisory |
https://support.apple.com/HT205641 | vendor advisory |
http://www.securitytracker.com/id/1033929 | vdb entry |
http://www.securityfocus.com/bid/77268 | vdb entry |