JVN#76788395
Sony mylo COM-2 does not verify server SSL certificate
Overview
Sony mylo COM-2 contains a vulnerability where it does not verify the server certificate when connecting to a server via SSL/TLS.
Products Affected
- mylo COM-2 system software prior to Ver.1.002 (Japan model)
- mylo COM-2 system software prior to Ver.1.002 (U.S. model)
Description
Sony mylo COM-2, a mobile terminal equipped with a web browser and media palyer, contains a vulnerability where it does not verify the server certificate when connecting to a server via SSL/TLS.
Impact
Normally, when a client connects to a web server through a SSL/TLS connection, it would verify the server's certificate and notify the user if the cerificate is found to be invalid. mylo COM-2 does not verify the server certificate when connecting via SSL/TLS. As a result, the user would not recognize an unreliable certificate, and may be directed to phishing sites etc.
Solution
Update the Software
Update to the latest version according to the information provided by the vendor.
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Analyzed on 2008.04.23
Measures | Conditions | Severity |
---|---|---|
Access Required | Routed - can be attacked over the Internet using packets |
|
Authentication | None - anonymous or no authentication (IP addresses do not count) |
|
User Interaction Required | Simple - the user must be convinced to take a standard action that does not feel harmful to most users, such as click on a link or view a file |
|
Exploit Complexity | Low - little to no expertise and/or luck required to exploit (cross-site scripting) |
|
Credit
Hiromitsu Takagi reported this vulnerability to IPA.
JPCERT/CC coordinated with the vendors under Information Security Early Warning Partnership.
Other Information
JPCERT Alert | |
JPCERT Reports | |
CERT Advisory | |
CPNI Advisory | |
TRnotes | |
CVE |
CVE-2008-1938 |
JVN iPedia |
JVNDB-2008-000023 |