cvelist/2011/2xxx/CVE-2011-2344.json
2019-03-18 03:05:13 +00:00

72 lines
2.7 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "security@google.com",
"ID": "CVE-2011-2344",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Android Picasa in Android 3.0 and 2.x through 2.3.4 uses a cleartext HTTP session when transmitting the authToken obtained from ClientLogin, which allows remote attackers to gain privileges and access private pictures and web albums by sniffing the token from connections with picasaweb.google.com."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://android.git.kernel.org/?p=platform/packages/apps/Gallery3D.git;a=commit;h=9a418de454e5ce078c98f41b5c18e3bb9175bd20",
"refsource": "CONFIRM",
"url": "http://android.git.kernel.org/?p=platform/packages/apps/Gallery3D.git;a=commit;h=9a418de454e5ce078c98f41b5c18e3bb9175bd20"
},
{
"name": "http://android.git.kernel.org/?p=platform/packages/apps/Gallery3D.git;a=commit;h=7a763db1c15bb6436be85a3f23382e4171970b6e",
"refsource": "CONFIRM",
"url": "http://android.git.kernel.org/?p=platform/packages/apps/Gallery3D.git;a=commit;h=7a763db1c15bb6436be85a3f23382e4171970b6e"
},
{
"name": "http://www.uni-ulm.de/en/in/mi/staff/koenings/catching-authtokens.html",
"refsource": "MISC",
"url": "http://www.uni-ulm.de/en/in/mi/staff/koenings/catching-authtokens.html"
}
]
}
}