First published: Mon Feb 11 2013(Updated: )
A security flaw was found in the way git-imap-send command (tool to send a collection of patches from stdin to an IMAP folder) of Git performed IMAP server's SSL x509.v3 certificate validation (server's hostname was previously not verified to match the CN field of the particular certificate). A rogue server could use this flaw to conduct man-in-the-middle (MiTM) attacks, possibly leading to disclosure of sensitive information. References: [1] <a href="https://www.kernel.org/pub/software/scm/git/docs/git-imap-send.html">https://www.kernel.org/pub/software/scm/git/docs/git-imap-send.html</a> [2] <a href="https://github.com/git/git/blob/master/imap-send.c#L233">https://github.com/git/git/blob/master/imap-send.c#L233</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Git Git-shell | <=1.8.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0308 has a medium severity rating due to the potential for man-in-the-middle attacks.
To fix CVE-2013-0308, upgrade to Git version 1.8.2 or later, where the issue has been resolved.
CVE-2013-0308 affects Git versions up to and including 1.8.1.3.
CVE-2013-0308 affects the git-imap-send command's ability to properly validate SSL x509.v3 certificates.
While the best solution is to upgrade, users can avoid the issue by using alternative methods for sending patches until an upgrade is feasible.