Files
CVEs-PoC/2014/CVE-2014-1266.md
T
2024-08-07 19:02:05 +00:00

33 lines
1.6 KiB
Markdown

### [CVE-2014-1266](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1266)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The SSLVerifySignedServerKeyExchange function in libsecurity_ssl/lib/sslKeyExchange.c in the Secure Transport feature in the Data Security component in Apple iOS 6.x before 6.1.6 and 7.x before 7.0.6, Apple TV 6.x before 6.0.2, and Apple OS X 10.9.x before 10.9.2 does not check the signature in a TLS Server Key Exchange message, which allows man-in-the-middle attackers to spoof SSL servers by (1) using an arbitrary private key for the signing step or (2) omitting the signing step.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/GhostTroops/TOP
- https://github.com/JERRY123S/all-poc
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/gabrielg/CVE-2014-1266-poc
- https://github.com/geeksniper/reverse-engineering-toolkit
- https://github.com/hatappo/compilerbook
- https://github.com/hktalent/TOP
- https://github.com/jbmihoub/all-poc
- https://github.com/landonf/Testability-CVE-2014-1266
- https://github.com/linusyang/SSLPatch
- https://github.com/meetlight942/PentesterLab-Intercept-CVE-2014-1266
- https://github.com/weeka10/-hktalent-TOP