A certain Apple patch for OpenSSL in Apple OS X 10.9.2 and earlier uses a Trust Evaluation Agent (TEA) feature without terminating certain TLS/SSL handshakes as specified in the SSL_CTX_set_verify callback function's documentation, which allows remote attackers to bypass extra verification within a custom application via a crafted certificate chain that is acceptable to TEA but not acceptable to that application.
References
Link | Resource |
---|---|
https://hynek.me/articles/apple-openssl-verification-surprises/ | Exploit |
Configurations
History
No history.
Information
Published : 2014-03-05 05:11
Updated : 2024-02-04 18:35
NVD link : CVE-2014-2234
Mitre link : CVE-2014-2234
CVE.ORG link : CVE-2014-2234
JSON object : View
Products Affected
apple
- mac_os_x
CWE
CWE-20
Improper Input Validation