SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (UNIX)  >   Apple macOS/OS X Vendors:   Apple
Mac OS X Includes Some Invalid Comodo Certificates
SecurityTracker Alert ID:  1025362
SecurityTracker URL:  http://securitytracker.com/id/1025362
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Apr 14 2011
Impact:   Modification of authentication information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 10.5.8, 10.6.7
Description:   A vulnerability was reported in Mac OS X. A remote user may be able to spoof sites.

The operating system includes some invalid certificates. The vulnerability is due to the invalid certificates and not the operating system itself. Other browsers, applications, and operating systems are affected.

A partner of Comodo with Registration Authority capabilities suffered an internal security breach and the attacker caused seven certificates to be fraudulently issued. The certificates have since been revoked. However, with some applications and systems, a man-in-the-middle attack may prevent the application or system from contacting the relevant On-line Certificate Status Protocol (OSCP) system and determining that the certificate has been revoked.

The following common names are affected:

addons.mozilla.org
login.live.com
mail.google.com
www.google.com
login.yahoo.com
login.skype.com
global trustee

Impact:   A remote user may be able to spoof sites.
Solution:   The vendor has issued a fix.

For Mac OS X v10.6.7 and Mac OS X Server v10.6.7
The download file is named: SecUpd2011-002Snow.dmg
Its SHA-1 digest is: 175c1adf0af15d817c272354dd75300ca6416792

For Mac OS X v10.5.8
The download file is named: SecUpd2011-002.dmg
Its SHA-1 digest is: d9ff801e7d7dd5ed76bfdd3adf8d2bf9c7336c44

For Mac OS X Server v10.5.8
The download file is named: SecUpdSrvr2011-002.dmg
Its SHA-1 digest is: 7f7282006484a8c9ef8dd30d28759b72641f5c44

The vendor's advisory is available at:

http://support.apple.com/kb/HT4608

Vendor URL:  support.apple.com/kb/HT4608 (Links to External Site)
Cause:   Configuration error

Message History:   None.


 Source Message Contents

Subject:  APPLE-SA-2011-04-14-4 Security Update 2011-002

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

APPLE-SA-2011-04-14-4 Security Update 2011-002

Security Update 2011-002 is now available and addresses the
following:

Certificate Trust Policy
Available for:  Mac OS X v10.5.8, Mac OS X Server v10.5.8,
Mac OS X v10.6.7, Mac OS X Server v10.6.7
Impact:  An attacker with a privileged network position may intercept
user credentials or other sensitive information
Description:  Several fraudulent SSL certificates were issued by a
Comodo affiliate registration authority. This may allow a man-in-the-
middle attacker to redirect connections and intercept user
credentials or other sensitive information. This issue is addressed
by blacklisting the fraudulent certificates.
Note: For iOS, this issue is addressed with iOS 4.3.2 and iOS 4.2.7.
For Windows systems, Safari relies on the certificate store of the
host operating system to determine if an SSL server certificate is
trustworthy. Applying the update described in Microsoft Knowledge
Base Article 2524375 will cause Safari to regard these certificates
as untrusted. The article is available at
http://support.microsoft.com/kb/2524375

For Mac OS X v10.6.7 and Mac OS X Server v10.6.7
The download file is named: SecUpd2011-002Snow.dmg
Its SHA-1 digest is: 175c1adf0af15d817c272354dd75300ca6416792

For Mac OS X v10.5.8
The download file is named: SecUpd2011-002.dmg
Its SHA-1 digest is: d9ff801e7d7dd5ed76bfdd3adf8d2bf9c7336c44

For Mac OS X Server v10.5.8
The download file is named: SecUpdSrvr2011-002.dmg
Its SHA-1 digest is: 7f7282006484a8c9ef8dd30d28759b72641f5c44

Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222

This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2.0.9 (Darwin)

iQEcBAEBAgAGBQJNpjYXAAoJEGnF2JsdZQeeCZAIAJL/+YRTDbncf9ZqikRKvqFx
Y9wfmeUlvEkzf91FWoBVxU9m1gPQ79LLKSpmNl9z12fSHJvL+qXpMNfAqBxhRDgV
XQXWSIoD74I2tYWpyoKZNylAis2X3wydxIQknpgfJyQF2skcVNHvDK7yMH3BR3lt
iUlg2od5SiTl+tuXTJzzrL9MnCK00D8bdaQv4Q2OH/D12PYX4U0AWH8v9r6xCA9/
V1yfgX7Zu5XjqjKJnSDF4FmPW0shd4aosP2JZcFAow0ITqAu44C0UsqR0Yn6HszK
w8NLGE9fLizRvNj4HRNiXdRbnZkpR2qXnu+5WOwQrg0TAAsHR7UHP28gDpXvloQ=
=n4ty
-----END PGP SIGNATURE-----
 _______________________________________________
Do not post admin requests to the list. They will be ignored.
Security-announce mailing list      (Security-announce@lists.apple.com)
 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC