CVE-2011-0189

Severity

50%

Complexity

99%

Confidentiality

48%

The default configuration of Terminal in Apple Mac OS X 10.6 before 10.6.7 uses SSH protocol version 1 within the New Remote Connection dialog, which might make it easier for man-in-the-middle attackers to spoof SSH servers by leveraging protocol vulnerabilities.

The default configuration of Terminal in Apple Mac OS X 10.6 before 10.6.7 uses SSH protocol version 1 within the New Remote Connection dialog, which might make it easier for man-in-the-middle attackers to spoof SSH servers by leveraging protocol vulnerabilities.

CVSS 2.0 Base Score 5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:N/I:P/A:N).

Overview

Type

Apple

First reported 13 years ago

2011-03-23 02:00:00

Last updated 13 years ago

2011-03-23 04:00:00

Affected Software

Apple Terminal

Apple Mac OS X 10.6.0

10.6.0

Apple Mac OS X 10.6.1

10.6.1

Apple Mac OS X 10.6.2

10.6.2

Apple Mac OS X 10.6.3

10.6.3

Apple Mac OS X 10.6.4

10.6.4

Apple Mac OS X 10.6.5

10.6.5

Apple Mac OS X 10.6.6

10.6.6

Apple Mac OS X Server 10.6.0

10.6.0

Apple Mac OS X Server 10.6.1

10.6.1

Apple Mac OS X Server 10.6.2

10.6.2

Apple Mac OS X Server 10.6.3

10.6.3

Apple Mac OS X Server 10.6.4

10.6.4

Apple Mac OS X Server 10.6.5

10.6.5

Apple Mac OS X Server 10.6.6

10.6.6

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.