2024-12-08 03:06:42 +00:00

119 lines
4.7 KiB
JSON

{
"id": "CVE-2019-18800",
"sourceIdentifier": "cve@mitre.org",
"published": "2019-11-06T16:15:10.993",
"lastModified": "2024-11-21T04:33:35.593",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Viber through 11.7.0.5 allows a remote attacker who can capture a victim's internet traffic to steal their Viber account, because not all Viber protocol traffic is encrypted. TCP data packet 9 on port 4244 from the victim's device contains cleartext information such as the device model and OS version, IMSI, and 20 bytes of udid in a binary format, which is located at offset 0x14 of this packet. Then, the attacker installs Viber on his device, initiates the registration process for any phone number, but doesn't enter a pin from SMS. Instead, he closes Viber. Next, the attacker rewrites his udid with the victim's udid, modifying the viber_udid file, which is located in the Viber preferences folder. (The udid is stored in a hexadecimal format.) Finally, the attacker starts Viber again and enters the pin from SMS."
},
{
"lang": "es",
"value": "Viber hasta la versi\u00f3n 11.7.0.5 permite a un atacante remoto que puede capturar el tr\u00e1fico de Internet de una v\u00edctima robar su cuenta de Viber, porque no todo el tr\u00e1fico del protocolo de Viber est\u00e1 encriptado. El paquete de datos TCP 9 en el puerto 4244 del dispositivo de la v\u00edctima contiene informaci\u00f3n de texto claro, como el modelo del dispositivo y la versi\u00f3n del sistema operativo, IMSI, y 20 bytes de udid en formato binario, que se encuentra en el desplazamiento 0x14 de este paquete. Luego, el atacante instala Viber en su dispositivo, inicia el proceso de registro para cualquier n\u00famero de tel\u00e9fono, pero no ingresa un pin de SMS. En cambio, cierra Viber. Luego, el atacante reescribe su udid con el udid de la v\u00edctima, modificando el archivo viber_udid, que se encuentra en la carpeta de preferencias de Viber. (El udid se almacena en un formato hexadecimal). Finalmente, el atacante inicia Viber nuevamente e ingresa el pin desde SMS."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-311"
},
{
"lang": "en",
"value": "CWE-319"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rakuten:viber:*:*:*:*:*:android:*:*",
"versionEndIncluding": "11.7.0.5",
"matchCriteriaId": "3EA36533-3061-435D-B434-24A56B1833C8"
}
]
}
]
}
],
"references": [
{
"url": "https://thesamarkand.tumblr.com/post/188785277609/viber-messenger-remote-account-reset-0day",
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://thesamarkand.tumblr.com/post/188785277609/viber-messenger-remote-account-reset-0day",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}