Published:2014/01/22  Last Updated:2014/01/22

JVN#81637882
Information disclosure vulnerability in Sleipnir Mobile for Android

Overview

Sleipnir Mobile for Android contains an issue in handling Geolocation API, which may result in the disclosure of a user's location.

Products Affected

  • Sleipnir Mobile for Android 2.12.1 and earlier
  • Sleipnir Mobile for Android Black Edition 2.12.1 and earlier

Description

Sleipnir Mobile for Android is a web browser for Android devices.  Sleipnir Mobile for Android contains an issue in handling Geolocation API, which may result in the disclosure of a user's location.

Impact

When a website that a user is viewing requests the user's location information, Sleipnir Mobile for Android sends a user's location to the website without obtaining the user's consent.

Solution

Update the software
Update to the latest version according to the information provided by the developer.

References

  1. W3C - Geolocation API Specification
    4.1 Privacy considerations for implementers of the Geolocation API

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Analyzed on 2014.01.22

Measures Conditions Severity
Access Required can be attacked over the Internet using packets
  • High
Authentication anonymous or no authentication (IP addresses do not count)
  • High
User Interaction Required the vulnerability can be exploited without an honest user taking any action
  • High
Exploit Complexity some expertise and/or luck required (most buffer overflows, guessing correctly in small space, expertise in Windows function calls)
  • Mid-High

Description of each analysis measures

Credit

Ryoji Tamura reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2014-0806
JVN iPedia JVNDB-2014-000007