Skip to content

The SSLVerifySignedServerKeyExchange function in...

Moderate severity Unreviewed Published May 14, 2022 to the GitHub Advisory Database • Updated Feb 9, 2024

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

The SSLVerifySignedServerKeyExchange function in libsecurity_ssl/lib/sslKeyExchange.c in the Secure Transport feature in the Data Security component in Apple iOS 6.x before 6.1.6 and 7.x before 7.0.6, Apple TV 6.x before 6.0.2, and Apple OS X 10.9.x before 10.9.2 does not check the signature in a TLS Server Key Exchange message, which allows man-in-the-middle attackers to spoof SSL servers by (1) using an arbitrary private key for the signing step or (2) omitting the signing step.

References

Published by the National Vulnerability Database Feb 22, 2014
Published to the GitHub Advisory Database May 14, 2022
Last updated Feb 9, 2024

Severity

Moderate

EPSS score

1.020%
(84th percentile)

CVE ID

CVE-2014-1266

GHSA ID

GHSA-4j69-27g2-fgcw

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.