The (1) CertGetCertificateChain, (2) CertVerifyCertificateChainPolicy, and (3) WinVerifyTrust APIs within the CryptoAPI for Microsoft products including Microsoft Windows 98 through XP, Office for Mac, Internet Explorer for Mac, and Outlook Express for Mac, do not properly verify the Basic Constraints of intermediate CA-signed X.509 certificates, which allows remote attackers to spoof the certificates of trusted sites via a man-in-the-middle attack for SSL sessions, as originally reported for Internet Explorer and IIS.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
History
20 Nov 2024, 23:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=102866120821995&w=2 - Mailing List | |
References | () http://marc.info/?l=bugtraq&m=102918200405308&w=2 - Mailing List | |
References | () http://marc.info/?l=bugtraq&m=102976967730450&w=2 - Mailing List | |
References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-050 - Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/9776 - Third Party Advisory, VDB Entry | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1056 - Broken Link | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1332 - Broken Link | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2671 - Broken Link |
09 Feb 2024, 03:26
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=102866120821995&w=2 - Mailing List | |
References | () http://marc.info/?l=bugtraq&m=102918200405308&w=2 - Mailing List | |
References | () http://marc.info/?l=bugtraq&m=102976967730450&w=2 - Mailing List | |
References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-050 - Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/9776 - Third Party Advisory, VDB Entry | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1056 - Broken Link | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1332 - Broken Link | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2671 - Broken Link | |
CWE | CWE-295 | |
CPE | cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:* cpe:2.3:a:microsoft:ie_for_macintosh:5.1:*:*:*:*:*:*:* cpe:2.3:a:microsoft:outlook_express:5.0:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp3:alpha:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp3:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp1:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:* cpe:2.3:a:microsoft:ie_for_macintosh:5.1.1:*:*:*:*:*:*:* cpe:2.3:a:microsoft:outlook_express:5.0.1:*:macos:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp2:terminal_server:*:*:*:*:* cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp3:*:*:*:*:*:* cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp6:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp2:alpha:*:*:*:*:* cpe:2.3:a:microsoft:internet_explorer:5.0.1:*:*:*:*:*:*:* cpe:2.3:a:microsoft:office:v.x:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:* cpe:2.3:a:kde:konqueror:3.0.1:*:*:*:*:*:*:* cpe:2.3:o:kde:kde:2.2.2:*:*:*:*:*:*:* cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:* cpe:2.3:a:microsoft:ie_for_macintosh:5.0:*:*:*:*:*:*:* cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:* cpe:2.3:a:microsoft:office:2001:*:macintosh:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:terminal_server:*:*:*:*:* cpe:2.3:a:adam_megacz:tinyssl:1.0.2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp5:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:alpha:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp6:terminal_server:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp4:alpha:*:*:*:*:* cpe:2.3:o:microsoft:windows_2000_terminal_services:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:* cpe:2.3:a:microsoft:outlook_express:5.0:*:macos:*:*:*:*:* cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:* cpe:2.3:a:kde:konqueror:3.0:*:*:*:*:*:*:* cpe:2.3:o:kde:kde:3.0:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:*:alpha:*:*:*:*:* cpe:2.3:a:microsoft:outlook_express:5.0.2:*:macos:*:*:*:*:* cpe:2.3:a:microsoft:outlook_express:5.0.3:*:macos:*:*:*:*:* cpe:2.3:a:kde:konqueror:2.2.2:*:*:*:*:*:*:* cpe:2.3:o:baltimore_technologies:mailsecure:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp1:alpha:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp4:*:*:*:*:*:* cpe:2.3:a:kde:konqueror:3.0.2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp5:alpha:*:*:*:*:* cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp1:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp6:alpha:*:*:*:*:* cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:* cpe:2.3:a:microsoft:office:98:*:mac:*:*:*:*:* cpe:2.3:a:microsoft:office:2001:sr1:mac_os:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp6a:*:*:*:*:*:* cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp2:*:*:*:*:*:* cpe:2.3:o:kde:kde:2.2.1:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:* cpe:2.3:o:kde:kde:3.0.2:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp1:terminal_server:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp5:terminal_server:*:*:*:*:* cpe:2.3:a:microsoft:outlook_express:4.5:*:macos:*:*:*:*:* cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:* cpe:2.3:o:kde:kde:3.0.1:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp4:terminal_server:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:sp3:terminal_server:*:*:*:*:* cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:* cpe:2.3:a:microsoft:internet_explorer:5.5:sp1:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_2000_terminal_services:*:sp2:*:*:*:*:*:* cpe:2.3:a:microsoft:internet_explorer:5.5:sp2:*:*:*:*:*:* |
cpe:2.3:o:microsoft:windows_nt:4.0:-:*:*:-:*:*:* cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_nt:4.0:-:*:*:terminal_server:*:*:* cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:* cpe:2.3:a:microsoft:outlook_express:-:*:*:*:*:*:*:* cpe:2.3:a:microsoft:office:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_me:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_98:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_98se:-:*:*:*:*:*:*:* cpe:2.3:a:microsoft:internet_explorer:-:*:*:*:*:*:*:* |
First Time |
Apple macos
Apple |
|
CVSS |
v2 : v3 : |
v2 : 6.8
v3 : unknown |
23 Jul 2021, 12:55
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:microsoft:ie:5.0.1:*:*:*:*:*:*:* cpe:2.3:a:microsoft:ie:5.5:*:*:*:*:*:*:* cpe:2.3:a:microsoft:ie:6.0:*:*:*:*:*:*:* cpe:2.3:a:microsoft:ie:5.0:*:*:*:*:*:*:* cpe:2.3:a:microsoft:ie:5.0.1:sp1:*:*:*:*:*:* cpe:2.3:a:microsoft:ie:5.0.1:sp2:*:*:*:*:*:* cpe:2.3:a:microsoft:ie:5.5:sp2:*:*:*:*:*:* |
cpe:2.3:a:microsoft:internet_explorer:5.5:sp2:*:*:*:*:*:* cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp2:*:*:*:*:*:* cpe:2.3:a:microsoft:internet_explorer:5.0.1:*:*:*:*:*:*:* cpe:2.3:a:microsoft:internet_explorer:5.5:*:*:*:*:*:*:* cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp1:*:*:*:*:*:* cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:* cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:* cpe:2.3:a:microsoft:internet_explorer:5.5:sp1:*:*:*:*:*:* |
Information
Published : 2002-10-04 04:00
Updated : 2024-11-20 23:40
NVD link : CVE-2002-0862
Mitre link : CVE-2002-0862
CVE.ORG link : CVE-2002-0862
JSON object : View
Products Affected
apple
- macos
microsoft
- office
- windows_me
- windows_98se
- windows_xp
- internet_explorer
- windows_2000
- windows_nt
- outlook_express
- windows_98
CWE
CWE-295
Improper Certificate Validation