mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-29 01:31:20 +00:00
136 lines
4.5 KiB
JSON
136 lines
4.5 KiB
JSON
{
|
|
"id": "CVE-2011-2344",
|
|
"sourceIdentifier": "cve-coordination@google.com",
|
|
"published": "2011-07-08T17:55:01.007",
|
|
"lastModified": "2011-07-08T17:55:01.007",
|
|
"vulnStatus": "Analyzed",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Android Picasa in Android 3.0 and 2.x through 2.3.4 uses a cleartext HTTP session when transmitting the authToken obtained from ClientLogin, which allows remote attackers to gain privileges and access private pictures and web albums by sniffing the token from connections with picasaweb.google.com."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Android Picasa en Android v3.0 y v2.x hasta v2.3.4 usa sesion HTTP en texto claro cuando se transmite el authToken obtenido de ClientLogin, lo que permite a usuarios remotos ganar privilegios y acceder a imagenes y albumes privados esnifando el token de conexiones con picasaweb.google.com"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 10.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": false,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-310"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:google:android:2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A33DBF65-09A6-4149-BABE-2FFFBF10C31D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "78B69434-13B2-4A43-AEB0-55E0ED403E54"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:google:android:2.2:rev1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D1755B91-1B6B-4A9E-BB6B-22B399A6DD02"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:google:android:2.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1A92E88F-CCED-41D7-AFB7-CE1F9265E546"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:google:android:2.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D13D3A00-27A0-4635-9D50-05CA81950691"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:google:android:2.3:rev1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "61D64B87-F1F1-4E52-86AE-F28E2C43A9A8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:google:android:2.3.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "286EED24-E011-4009-BC2E-B63CA06072CE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:google:android:2.3.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D634E2E3-4E8A-4C88-A6BF-DBE7439EB3B0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6997F035-D2F5-4174-B979-5D42FF69D9AC"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "http://android.git.kernel.org/?p=platform/packages/apps/Gallery3D.git;a=commit;h=7a763db1c15bb6436be85a3f23382e4171970b6e",
|
|
"source": "cve-coordination@google.com",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://android.git.kernel.org/?p=platform/packages/apps/Gallery3D.git;a=commit;h=9a418de454e5ce078c98f41b5c18e3bb9175bd20",
|
|
"source": "cve-coordination@google.com",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.uni-ulm.de/en/in/mi/staff/koenings/catching-authtokens.html",
|
|
"source": "cve-coordination@google.com",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
}
|
|
]
|
|
} |