Published:2014/02/26  Last Updated:2014/08/26

JVN#48810179
Denny's App for Android. contains an issue where it fails to verify SSL server certificates

Overview

Denny's App for Android. contains an issue where it fails to verify SSL server certificates.

Products Affected

  • Denny's App for Android. ver.2.0.0 and earlier

Description

Denny's App for Android. contains an issue where it fails to verify SSL server certificates.

Impact

A man-in-the-middle attack may allow an attacker to eavesdrop on an encrypted communication.

Solution

Update the Software
Update to the latest version according to the information provided by the developer.

Denny's App for Android. ver.2.0.1, the version that contains a fix for this vulnerability was released on 2014 February 12.

Vendor Status

Vendor Link
Seven & i Food Systems Co., Ltd. Denny's - Android Apps on Google Play

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Analyzed on 2014.02.26

Measures Conditions Severity
Access Required must be attacked from a local segment, such as Ethernet, Bluetooth, and 802.11 attacks
  • Mid-High
Authentication anonymous or no authentication (IP addresses do not count)
  • High
User Interaction Required the vulnerability can be exploited without an honest user taking any action
  • High
Exploit Complexity expertise and/or luck required (guessing correctly in medium-sized space, kernel expertise)
  • Low-Mid

Description of each analysis measures

Comment

This analysis assumes a man-in-the-middle attack being conducted by an attacker that places a malicious wireless LAN access point.

Credit

kurisu and matt reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2014-1967
JVN iPedia JVNDB-2014-000022

Update History

2014/08/26
Fixed information under "Impact"