JVN#03015214
KUNAI Browser for Remote Service beta vulnerable in the WebView class
Overview
KUNAI Browser for Remote Service beta contains a vulnerability in the WebView class.
Products Affected
- KUNAI Browser for Remote Service beta
Description
KUNAI Browser for Remote Service beta is an Android browser software for using Cybozu. KUNAI Browser for Remote Service beta contains a vulnerability in the WebView class.
Impact
When there is a malicious file in the user's Android device, clicking a file:// hyperlink may lead to the malicious file being opened and information managed by the product may be disclosed.
Solution
Do not use KUNAI Browser for Remote Service beta
Please stop use of KUNAI Browser for Remote Service beta according to the information provided by the developer.
The developer has stopped distributing the product.
Vendor Status
Vendor | Link |
Cybozu | Use on a smartphone (Japanese Only) |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Analyzed on 2012.09.13
Measures | Conditions | Severity |
---|---|---|
Access Required | can be attacked over the Internet using packets |
|
Authentication | login caused to be created by an administrator |
|
User Interaction Required | the user must be convinced to take a standard action that does not feel harmful to most users, such as click on a link or view a file |
|
Exploit Complexity | some expertise and/or luck required (most buffer overflows, guessing correctly in small space, expertise in Windows function calls) |
|
Description of each analysis measures
Comment
This analysis assumes that the user is tricked into storing a malicious file.
Credit
Other Information
JPCERT Alert | |
JPCERT Reports | |
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2012-4013 |
JVN iPedia |
JVNDB-2012-000085 |