JVN#48810179
Denny's App for Android. contains an issue where it fails to verify SSL server certificates
Overview
Denny's App for Android. contains an issue where it fails to verify SSL server certificates.
Products Affected
- Denny's App for Android. ver.2.0.0 and earlier
Description
Denny's App for Android. contains an issue where it fails to verify SSL server certificates.
Impact
A man-in-the-middle attack may allow an attacker to eavesdrop on an encrypted communication.
Solution
Update the Software
Update to the latest version according to the information provided by the developer.
Denny's App for Android. ver.2.0.1, the version that contains a fix for this vulnerability was released on 2014 February 12.
Vendor Status
Vendor | Link |
Seven & i Food Systems Co., Ltd. | Denny's - Android Apps on Google Play |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Analyzed on 2014.02.26
Measures | Conditions | Severity |
---|---|---|
Access Required | must be attacked from a local segment, such as Ethernet, Bluetooth, and 802.11 attacks |
|
Authentication | anonymous or no authentication (IP addresses do not count) |
|
User Interaction Required | the vulnerability can be exploited without an honest user taking any action |
|
Exploit Complexity | expertise and/or luck required (guessing correctly in medium-sized space, kernel expertise) |
|
Comment
This analysis assumes a man-in-the-middle attack being conducted by an attacker that places a malicious wireless LAN access point.
Credit
kurisu and matt reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert | |
JPCERT Reports | |
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2014-1967 |
JVN iPedia |
JVNDB-2014-000022 |
Update History
- 2014/08/26
- Fixed information under "Impact"