A certain Apple patch for OpenSSL in Apple OS X 10.9.2 and previous versions uses a Trust Evaluation Agent (TEA) feature without terminating certain TLS/SSL handshakes as specified in the SSL_CTX_set_verify callback function's documentation, which allows remote malicious users to bypass extra verification within a custom application via a crafted certificate chain that is acceptable to TEA but not acceptable to that application.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apple mac os x |