5.8
CVSSv2

CVE-2014-1266

Published: 22/02/2014 Updated: 09/02/2024
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.4 | Impact Score: 5.2 | Exploitability Score: 2.2
VMScore: 517
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Summary

The SSLVerifySignedServerKeyExchange function in libsecurity_ssl/lib/sslKeyExchange.c in the Secure Transport feature in the Data Security component in Apple iOS 6.x prior to 6.1.6 and 7.x prior to 7.0.6, Apple TV 6.x prior to 6.0.2, and Apple OS X 10.9.x prior to 10.9.2 does not check the signature in a TLS Server Key Exchange message, which allows man-in-the-middle malicious users to spoof SSL servers by (1) using an arbitrary private key for the signing step or (2) omitting the signing step.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apple mac os x

apple tvos

apple iphone os

Github Repositories

『低レイヤを知りたい人のためのCコンパイラ作成入門』

『低レイヤを知りたい人のためのCコンパイラ作成入門』 をやってみる wwwsigbusinfo/compilerbook#%E3%81%AF%E3%81%98%E3%82%81%E3%81%AB 2020-03-16 githubcom/rui314/9cc the successor: githubcom/rui314/chibicc TOC 全体的なノート 各章のノート いろんな人のやってみた記録 Cコンパイラ作成集中

Patch iOS SSL vulnerability (CVE-2014-1266)

SSL Patch (CVE-2014-1266) Copyright (c) 2014 Linus Yang Introduction CVE-2014-1266, or known as "goto fail SSL verification exploit", is a very serious SSL/TLS vulnerability of iOS and OS X Apple issues iOS 616 and 706 to fix this problem, but ignores some users who can't or just don't want to upgrade their systems to iOS 7 (eg users with older device

Apple OS X/iOS SSL flaw demonstration

OS X/iOS SSL Flaw POC Overview This repository contains some Go code that demonstrates the recently discovered SSL verification vulnerability in iOS and OS X Apple Update Announcement Adam Langley's writeup Usage $ git clone githubcom/gabrielg/CVE-2014-1266-pocgit $ cd CVE-2014-1266-poc $ go build maingo $ /main # In another terminal $ cd CVE-2014-1266-poc

Recent Articles

Update your iThings NOW: Apple splats scary SSL snooping bug in iOS
The Register • Chris Williams, Editor in Chief • 21 Feb 2014

OS X Mavericks still VULNERABLE, millions at risk of web hijacking

Updated2 Apple has updated its mobile operating system iOS to patch a bug that blows apart the integrity of encrypted connections. Versions 7.0.6 and 6.1.6, available now for download, fixes a vulnerability that could allow "an attacker with a privileged network position" to "capture or modify data in sessions protected by SSL/TLS," according to the iPhone maker. This is due to the Secure Transport component of the operating system failing to validate "the authenticity of the connection," sugges...