Published:2012/12/21  Last Updated:2012/12/21

JVN#42625179
Loctouch for Android vulnerable in handling of implicit intents

Overview

Loctouch for Android contains a vulnerability in the handling of implicit intents.

Products Affected

  • Loctouch for Android 3.4.6 and earlier

Description

Loctouch provided by NHN Japan, is an application that logs location information. Loctouch for Android contains a vulnerability in the handling of implicit intents.

Impact

Location logs that include non-public information may be leaked to a third party through a malicious Android application.

Solution

Update the software
Update to the latest version according to the information provided by the developer.

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Analyzed on 2012.12.21

Measures Conditions Severity
Access Required can be attacked over the Internet using packets
  • High
Authentication anonymous or no authentication (IP addresses do not count)
  • High
User Interaction Required the user must be convinced to take a difficult or suspicious action. If the honest user must have elevated privileges, they are likely to be more suspicious
  • Low
Exploit Complexity some expertise and/or luck required (most buffer overflows, guessing correctly in small space, expertise in Windows function calls)
  • Mid-High

Description of each analysis measures

Comment

This analysis assumes that the user is tricked into installing a malicious application.

Credit

Gaku Mochizuki of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2012-5182
JVN iPedia JVNDB-2012-000114