Android Picasa in Android 3.0 and 2.x through 2.3.4 uses a cleartext HTTP session when transmitting the authToken obtained from ClientLogin, which allows remote attackers to gain privileges and access private pictures and web albums by sniffing the token from connections with picasaweb.google.com.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://android.git.kernel.org/?p=platform/packages/apps/Gallery3D.git%3Ba=commit%3Bh=7a763db1c15bb6436be85a3f23382e4171970b6e - | |
References | () http://android.git.kernel.org/?p=platform/packages/apps/Gallery3D.git%3Ba=commit%3Bh=9a418de454e5ce078c98f41b5c18e3bb9175bd20 - | |
References | () http://www.uni-ulm.de/en/in/mi/staff/koenings/catching-authtokens.html - |
Information
Published : 2011-07-08 17:55
Updated : 2024-11-21 01:28
NVD link : CVE-2011-2344
Mitre link : CVE-2011-2344
CVE.ORG link : CVE-2011-2344
JSON object : View
Products Affected
- android
CWE
CWE-310
Cryptographic Issues