CVE-2013-0308
git: Incorrect IMAP server's SSL x509.v3 certificate validation in git-imap-send command
Severity Score
4.3
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The imap-send command in GIT before 1.8.1.4 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
El comando imap-send en GIT antes de v1.8.1.4 no comprueba si el nombre del servidor coincide con un nombre de dominio en el nombre común del sujeto (CN) o el campo subjectAltName del certificado X.509, lo que permite atacantes MITM (Man-In-The-Middle) suplantar servidores SSL de su elección a través de un certificado válido.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2012-12-06 CVE Reserved
- 2013-03-05 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (18)
URL | Tag | Source |
---|---|---|
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=701586 | X_refsource_misc | |
http://marc.info/?l=git&m=136134619013145&w=2 | Mailing List | |
http://support.apple.com/kb/HT5937 | X_refsource_confirm | |
http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html | X_refsource_confirm | |
http://www.securityfocus.com/bid/58148 | Vdb Entry | |
http://www.securitytracker.com/id/1028205 | Vdb Entry | |
https://bugzilla.novell.com/show_bug.cgi?id=804730 | X_refsource_misc | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/82329 | Vdb Entry | |
https://raw.github.com/git/git/master/Documentation/RelNotes/1.8.1.4.txt | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.apple.com/archives/security-announce/2013/Sep/msg00007.html | 2021-01-26 | |
http://lists.opensuse.org/opensuse-updates/2013-03/msg00005.html | 2021-01-26 | |
http://lists.opensuse.org/opensuse-updates/2013-03/msg00007.html | 2021-01-26 | |
http://rhn.redhat.com/errata/RHSA-2013-0589.html | 2021-01-26 | |
http://secunia.com/advisories/52361 | 2021-01-26 | |
http://secunia.com/advisories/52443 | 2021-01-26 | |
http://secunia.com/advisories/52467 | 2021-01-26 | |
https://bugzilla.redhat.com/show_bug.cgi?id=909977 | 2013-03-04 | |
https://access.redhat.com/security/cve/CVE-2013-0308 | 2013-03-04 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Git-scm Search vendor "Git-scm" | Git Search vendor "Git-scm" for product "Git" | <= 1.8.1.3 Search vendor "Git-scm" for product "Git" and version " <= 1.8.1.3" | - |
Affected
|