mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
102 lines
3.8 KiB
JSON
102 lines
3.8 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "product-security@apple.com",
|
|
"ID": "CVE-2014-1266",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The SSLVerifySignedServerKeyExchange function in libsecurity_ssl/lib/sslKeyExchange.c in the Secure Transport feature in the Data Security component in Apple iOS 6.x before 6.1.6 and 7.x before 7.0.6, Apple TV 6.x before 6.0.2, and Apple OS X 10.9.x before 10.9.2 does not check the signature in a TLS Server Key Exchange message, which allows man-in-the-middle attackers to spoof SSL servers by (1) using an arbitrary private key for the signing step or (2) omitting the signing step."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "http://support.apple.com/kb/HT6147",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://support.apple.com/kb/HT6147"
|
|
},
|
|
{
|
|
"name": "http://support.apple.com/kb/HT6148",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://support.apple.com/kb/HT6148"
|
|
},
|
|
{
|
|
"name": "https://www.cs.columbia.edu/~smb/blog/2014-02/2014-02-23.html",
|
|
"refsource": "MISC",
|
|
"url": "https://www.cs.columbia.edu/~smb/blog/2014-02/2014-02-23.html"
|
|
},
|
|
{
|
|
"name": "http://support.apple.com/kb/HT6150",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://support.apple.com/kb/HT6150"
|
|
},
|
|
{
|
|
"name": "http://support.apple.com/kb/HT6146",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://support.apple.com/kb/HT6146"
|
|
},
|
|
{
|
|
"name": "http://it.slashdot.org/comments.pl?sid=4821073&cid=46310187",
|
|
"refsource": "MISC",
|
|
"url": "http://it.slashdot.org/comments.pl?sid=4821073&cid=46310187"
|
|
},
|
|
{
|
|
"name": "https://www.cs.columbia.edu/~smb/blog/2014-02/2014-02-24.html",
|
|
"refsource": "MISC",
|
|
"url": "https://www.cs.columbia.edu/~smb/blog/2014-02/2014-02-24.html"
|
|
},
|
|
{
|
|
"name": "https://www.imperialviolet.org/2014/02/22/applebug.html",
|
|
"refsource": "MISC",
|
|
"url": "https://www.imperialviolet.org/2014/02/22/applebug.html"
|
|
},
|
|
{
|
|
"name": "https://news.ycombinator.com/item?id=7281378",
|
|
"refsource": "MISC",
|
|
"url": "https://news.ycombinator.com/item?id=7281378"
|
|
}
|
|
]
|
|
}
|
|
} |