POC详情: 179cf6a317abfe27c72cb3ae589fc79c27ab5636

来源
关联漏洞
标题: Apple iOS ‘SSLVerifySignedServerKeyExchange’函数输入验证漏洞 (CVE-2014-1266)
描述:Apple iOS、Apple TV和Apple OS X都是美国苹果(Apple)公司的产品。Apple iOS是为移动设备所开发的一套操作系统;Apple TV是一款高清电视机顶盒产品;Apple OS X是为Mac计算机所开发的一套专用操作系统。 Apple iOS中的Data Security组件Secure Transport的功能的libsecurity_ssl/lib/sslKeyExchange.c文件中的‘SSLVerifySignedServerKeyExchange’函数存在安全漏洞
描述
Apple OS X/iOS SSL flaw demonstration
介绍
# OS X/iOS SSL Flaw POC

## Overview

This repository contains some Go code that demonstrates the recently discovered
SSL verification vulnerability in iOS and OS X.

* [Apple Update Announcement](http://support.apple.com/kb/HT6147)
* [Adam Langley's writeup](https://www.imperialviolet.org/2014/02/22/applebug.html)

## Usage

```
$ git clone https://github.com/gabrielg/CVE-2014-1266-poc.git
$ cd CVE-2014-1266-poc
$ go build main.go
$ ./main

# In another terminal
$ cd CVE-2014-1266-poc
$ go run http_server.go
```

Then set the proxy on a vulnerable machine to point at port 8080 on the machine
running the proxy server. HTTPS requests will be intercepted and redirected to
the HTTP server listening on the UNIX domain socket that the proxy makes
connections to.

![screenshot](screenshot.png)

---

Pass the time with some reading over at [gironda.org](http://www.gironda.org).
文件快照

[4.0K] /data/pocs/179cf6a317abfe27c72cb3ae589fc79c27ab5636 ├── [ 675] http_server.go ├── [6.3K] main.go ├── [ 884] README.md └── [299K] screenshot.png 0 directories, 4 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。