Mac OS X Fraudulent Digital Certificates (Security Update 2011-002)

This script is Copyright (C) 2011-2012 Tenable Network Security, Inc.


Synopsis :

The remote host is missing a Mac OS X update that fixes a security
issue.

Description :

The remote host is running a version of Mac OS X 10.6 or 10.5 that
does not have Security Update 2011-002 applied.

A certificate authority (CA) has revoked a number of fraudulent SSL
certificates for several prominent, public websites. Without this
update, browsers will be unable to learn that the certificates have
been revoked if either Online Certificate Status Protocol (OCSP) is
disabled, or OCSP is enabled and fails.

If an attacker can trick someone into using the affected browser and
visiting a malicious site using one of the fraudulent certificates, he
may be able to fool that user into believing the site is a legitimate
one. In turn, the user could send credentials to the malicious site
or download and install applications.

See also :

http://support.apple.com/kb/HT4608
http://www.comodo.com/Comodo-Fraud-Incident-2011-03-23.html
http://lists.apple.com/archives/security-announce/2011/Apr/msg00003.html

Solution :

Install Security Update 2011-002 or later.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)

Family: MacOS X Local Security Checks

Nessus Plugin ID: 53412 ()

Bugtraq ID:

CVE ID: