A certain Apple patch for OpenSSL in Apple OS X 10.9.2 and earlier uses a Trust Evaluation Agent (TEA) feature without terminating certain TLS/SSL handshakes as specified in the SSL_CTX_set_verify callback function's documentation, which allows remote attackers to bypass extra verification within a custom application via a crafted certificate chain that is acceptable to TEA but not acceptable to that application.
References
Link | Resource |
---|---|
https://hynek.me/articles/apple-openssl-verification-surprises/ | Exploit |
Configurations
Information
Published : 2014-03-04 21:11
Updated : 2014-03-05 09:44
NVD link : CVE-2014-2234
Mitre link : CVE-2014-2234
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
apple
- mac_os_x