Apple Xcode < 5.0 (Mac OS X)

medium Nessus Plugin ID 70093

Synopsis

The remote host has an application installed that is prone to a man-in-the-middle attack.

Description

The remote Mac OS X host has Apple Xcode prior to 5.0 installed. It, therefore, includes a version of git in which the imap-send command reportedly does not verify that a server hostname matches the domain name in its X.509 certificate. A man-in-the-middle attacker could leverage this vulnerability to spoof SSL servers via an arbitrary valid certificate.

Solution

Upgrade to Apple Xcode version 5.0 or later, available for OS X Mountain Lion 10.8.4 or later.

See Also

http://support.apple.com/kb/HT5937

http://lists.apple.com/archives/security-announce/2013/Sep/msg00007.html

http://www.securityfocus.com/archive/1/528719/30/0/threaded

Plugin Details

Severity: Medium

ID: 70093

File Name: macosx_xcode_5_0.nasl

Version: 1.3

Type: local

Agent: macosx

Published: 9/24/2013

Updated: 5/5/2020

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.5

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2013-0308

CVSS v3

Risk Factor: Medium

Base Score: 4.2

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N

Vulnerability Information

CPE: cpe:/a:apple:xcode

Required KB Items: Host/local_checks_enabled, Host/MacOSX/Version, installed_sw/Apple Xcode

Exploit Ease: No known exploits are available

Patch Publication Date: 9/18/2013

Vulnerability Publication Date: 2/19/2013

Reference Information

CVE: CVE-2013-0308

BID: 58148

APPLE-SA: APPLE-SA-2013-09-18-3