JVN#42625179
Loctouch for Android vulnerable in handling of implicit intents
Overview
Loctouch for Android contains a vulnerability in the handling of implicit intents.
Products Affected
- Loctouch for Android 3.4.6 and earlier
Description
Loctouch provided by NHN Japan, is an application that logs location information. Loctouch for Android contains a vulnerability in the handling of implicit intents.
Impact
Location logs that include non-public information may be leaked to a third party through a malicious Android application.
Solution
Update the software
Update to the latest version according to the information provided by the developer.
Vendor Status
Vendor | Link |
NHN Japan Corporation | Loctouch - Android Apps on Google Play |
Loctouch - au Smart Pass (Japanese only) |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Analyzed on 2012.12.21
Measures | Conditions | Severity |
---|---|---|
Access Required | can be attacked over the Internet using packets |
|
Authentication | anonymous or no authentication (IP addresses do not count) |
|
User Interaction Required | the user must be convinced to take a difficult or suspicious action. If the honest user must have elevated privileges, they are likely to be more suspicious |
|
Exploit Complexity | some expertise and/or luck required (most buffer overflows, guessing correctly in small space, expertise in Windows function calls) |
|
Description of each analysis measures
Comment
This analysis assumes that the user is tricked into installing a malicious application.
Credit
Gaku Mochizuki of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert | |
JPCERT Reports | |
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2012-5182 |
JVN iPedia |
JVNDB-2012-000114 |