{"vuid":"VU#734032","idnumber":"734032","name":"Apple Mac OS X Security Framework Secure Transport may not negotiate the best cipher available","keywords":["Apple","Mac","OS X","Security Framework","Secure Transport","information disclosure","apple-2006-007"],"overview":"Apple Mac OS X Security Framework Secure Transport may not negotiate the best cipher available. This vulnerability may allow traffic to be weakly encrypted.","clean_desc":"Secure Transport refers to Apple’s implementation of SSL and TLS that is used by Mac OS X to create secure connections over TCP/IP connections. According to Apple Security Update 2006-007: Due to the order they are evaluated, it is possible for Secure Transport to use a cipher that provides no encryption or authentication when better ciphers are available. Applications using Secure Transport through CFNetwork, such as Safari, are not affected by this issue on systems with Security Update 2006-006 or later. This issue does not affect systems using Mac OS X v10.4.8 and later","impact":"A remote, unauthenticated attacker may be able to observe the plaintext of traffic believed to be securely encrypted.","resolution":"Apply Apple Updates\nThis issue is addressed by Apple Security Update 2006-007.","workarounds":"","sysaffected":"","thanks":"This issue was reported in Apple Security Update \n2006-007\n. Apple credits\n Eric Cronin of gizmolabs for reporting this issue.","author":"This document was written by Chris Taschner.","public":["http://docs.info.apple.com/article.html?artnum=304829","http://secunia.com/advisories/23155/"],"cveids":["CVE-2006-4407"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-11-29T13:59:11Z","publicdate":"2006-11-28T00:00:00Z","datefirstpublished":"2006-11-30T15:17:12Z","dateupdated":"2006-11-30T15:20:31Z","revision":11,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"15","cam_impact":"8","cam_easeofexploitation":"18","cam_attackeraccessrequired":"18","cam_scorecurrent":"10.935","cam_scorecurrentwidelyknown":"14.58","cam_scorecurrentwidelyknownexploited":"29.16","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":10.935,"vulnote":null}