Apple Security Advisory 2013-09-18-3 - Xcode 5.0 is now available and addresses a security issue in Git. When using the imap-send command, git did not verify that the server hostname matched a domain name in the X.509 certificate, which allowed a man-in-the-middle attacker to spoof SSL servers via an arbitrary valid certificate. This issue was addressed by updating git to version 1.8.3.1.
36470237c2b9e2979b0fb025e050ba382aeb9d886ccd43cd170b2d45dd2f3523
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
APPLE-SA-2013-09-18-3 Xcode 5.0
Xcode 5.0 is now available and addresses the following:
Git
Available for: OS X Mountain Lion v10.8.4 or later
Impact: An attacker with a privileged network position may intercept
user credentials or other sensitive information
Description: When using the imap-send command, git did not verify
that the server hostname matched a domain name in the X.509
certificate, which allowed a man-in-the-middle attacker to spoof SSL
servers via an arbitrary valid certificate. This issue was addressed
by updating git to version 1.8.3.1.
CVE-ID
CVE-2013-0308
Xcode 5.0 is also available from the App Store. It is free to anyone
with OS X 10.8.x Mountain Lion and later.
To check that the Xcode has been updated:
* Select Xcode in the menu bar
* Select About Xcode
* The version after applying this update will be "5.0".
Information will also be posted to the Apple Security Updates
web site: http://support.apple.com/kb/HT1222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2.0.17 (Darwin)
Comment: GPGTools - http://gpgtools.org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=hxAK
-----END PGP SIGNATURE-----