The X.509 certificate-trust implementation in Apple iOS before 9.1 does not recognize that the kSecRevocationRequirePositiveResponse flag implies a revocation-checking requirement, which makes it easier for man-in-the-middle attackers to spoof endpoints by leveraging access to a revoked certificate.
References
Link | Resource |
---|---|
http://lists.apple.com/archives/security-announce/2015/Oct/msg00002.html | Vendor Advisory |
https://support.apple.com/HT205370 | Vendor Advisory |
https://support.apple.com/HT205641 | Vendor Advisory |
http://lists.apple.com/archives/security-announce/2015/Dec/msg00002.html | Vendor Advisory |
http://www.securityfocus.com/bid/77268 | |
http://www.securitytracker.com/id/1033929 |
Information
Published : 2015-10-23 03:59
Updated : 2016-12-23 18:59
NVD link : CVE-2015-6997
Mitre link : CVE-2015-6997
JSON object : View
CWE
CWE-254
7PK - Security Features
Products Affected
apple
- watchos
- iphone_os