The X.509 certificate-trust implementation in Apple OS X before 10.11 does not recognize that the kSecRevocationRequirePositiveResponse flag implies a revocation-checking requirement, which makes it easier for man-in-the-middle attackers to spoof endpoints by leveraging access to a revoked certificate.
https://support.apple.com/HT205267
http://www.securitytracker.com/id/1033703
http://www.securityfocus.com/bid/76908
http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html