Apple Xcode < 5.0 (Mac OS X)

Medium Nessus Plugin ID 70093


The remote host has an application installed that is prone to a man-in-the-middle attack.


The remote Mac OS X host has Apple Xcode prior to 5.0 installed. It, therefore, includes a version of git in which the imap-send command reportedly does not verify that a server hostname matches the domain name in its X.509 certificate. A man-in-the-middle attacker could leverage this vulnerability to spoof SSL servers via an arbitrary valid certificate.


Upgrade to Apple Xcode version 5.0 or later, available for OS X Mountain Lion 10.8.4 or later.

See Also

Plugin Details

Severity: Medium

ID: 70093

File Name: macosx_xcode_5_0.nasl

Version: $Revision: 1.1 $

Type: local

Agent: macosx

Published: 2013/09/24

Modified: 2013/09/24

Dependencies: 61412

Risk Information

Risk Factor: Medium


Base Score: 4.3

Temporal Score: 3.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:apple:xcode

Required KB Items: Host/local_checks_enabled, Host/MacOSX/Version, MacOSX/Xcode/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2013/09/18

Vulnerability Publication Date: 2013/02/19

Reference Information

CVE: CVE-2013-0308

BID: 58148

OSVDB: 90610

APPLE-SA: APPLE-SA-2013-09-18-3