A certain Apple patch for OpenSSL in Apple OS X 10.9.2 and earlier uses a Trust Evaluation Agent (TEA) feature without terminating certain TLS/SSL handshakes as specified in the SSL_CTX_set_verify callback function's documentation, which allows remote attackers to bypass extra verification within a custom application via a crafted certificate chain that is acceptable to TEA but not acceptable to that application.
Advisories
Source ID Title
EUVD EUVD EUVD-2014-2274 A certain Apple patch for OpenSSL in Apple OS X 10.9.2 and earlier uses a Trust Evaluation Agent (TEA) feature without terminating certain TLS/SSL handshakes as specified in the SSL_CTX_set_verify callback function's documentation, which allows remote attackers to bypass extra verification within a custom application via a crafted certificate chain that is acceptable to TEA but not acceptable to that application.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T10:06:00.190Z

Reserved: 2014-02-28T00:00:00

Link: CVE-2014-2234

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-03-05T05:11:22.453

Modified: 2025-04-12T10:46:40.837

Link: CVE-2014-2234

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses