First published: Mon Feb 11 2013(Updated: )
A security flaw was found in the way git-imap-send command (tool to send a collection of patches from stdin to an IMAP folder) of Git performed IMAP server's SSL x509.v3 certificate validation (server's hostname was previously not verified to match the CN field of the particular certificate). A rogue server could use this flaw to conduct man-in-the-middle (MiTM) attacks, possibly leading to disclosure of sensitive information. References: [1] <a href="https://www.kernel.org/pub/software/scm/git/docs/git-imap-send.html">https://www.kernel.org/pub/software/scm/git/docs/git-imap-send.html</a> [2] <a href="https://github.com/git/git/blob/master/imap-send.c#L233">https://github.com/git/git/blob/master/imap-send.c#L233</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Git-scm Git | <=1.8.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.