Published:2012/12/21  Last Updated:2012/12/21

Loctouch for Android vulnerable in handling of implicit intents


Loctouch for Android contains a vulnerability in the handling of implicit intents.

Products Affected

  • Loctouch for Android 3.4.6 and earlier


Loctouch provided by NHN Japan, is an application that logs location information. Loctouch for Android contains a vulnerability in the handling of implicit intents.


Location logs that include non-public information may be leaked to a third party through a malicious Android application.


Update the software
Update to the latest version according to the information provided by the developer.


JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Analyzed on 2012.12.21

Measures Conditions Severity
Access Required can be attacked over the Internet using packets
  • High
Authentication anonymous or no authentication (IP addresses do not count)
  • High
User Interaction Required the user must be convinced to take a difficult or suspicious action. If the honest user must have elevated privileges, they are likely to be more suspicious
  • Low
Exploit Complexity some expertise and/or luck required (most buffer overflows, guessing correctly in small space, expertise in Windows function calls)
  • Mid-High

Description of each analysis measures


This analysis assumes that the user is tricked into installing a malicious application.


Gaku Mochizuki of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Reports
CERT Advisory
CPNI Advisory
CVE CVE-2012-5182
JVN iPedia JVNDB-2012-000114