mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
106 lines
3.4 KiB
JSON
106 lines
3.4 KiB
JSON
{
|
|
"id": "CVE-2010-4212",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2010-11-09T01:00:02.743",
|
|
"lastModified": "2010-12-22T05:00:00.000",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "The USAA application 3.0 for Android stores a mirror image of each visited web page, which might allow physically proximate attackers to obtain sensitive banking information by reading application data."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "La aplicaci\u00f3n USAA v3.0 para Android, almacena una imagen de espejo de las p\u00e1ginas web visitadas, lo que podr\u00eda permitir a atacantes f\u00edsicamente pr\u00f3ximos a obtener informaci\u00f3n bancaria confidencial mediante la lectura de datos de aplicaci\u00f3n."
|
|
}
|
|
],
|
|
"vendorComments": [
|
|
{
|
|
"organization": "usaa",
|
|
"comment": "Contrary to the Wall Street Journal article referenced in this summary, the USAA Android application never allowed attackers to obtain user names or passwords. Limited transactional data was available only if one had physical possession of the device and had access (and used) extremely sophisticated forensics applications. Although this was a low risk vulnerability, USAA resolved the problem within 24 hours of notification. The resolution of the problem was validated by ViaForensics",
|
|
"lastModified": "2010-12-22T00:00:00"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
|
|
"accessVector": "LOCAL",
|
|
"accessComplexity": "MEDIUM",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "PARTIAL",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 1.9
|
|
},
|
|
"baseSeverity": "LOW",
|
|
"exploitabilityScore": 3.4,
|
|
"impactScore": 2.9,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-264"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"operator": "AND",
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:usaa:usaa:3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "82A6F4D8-056D-42B3-AB2B-4C940A2293B8"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": false,
|
|
"criteria": "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8255F035-04C8-4158-B301-82101711939C"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://news.cnet.com/8301-27080_3-20021874-245.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://online.wsj.com/article/SB10001424052748703805704575594581203248658.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://viaforensics.com/appwatchdog/usaa-android.html",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |