JVN#81637882
Information disclosure vulnerability in Sleipnir Mobile for Android
Overview
Sleipnir Mobile for Android contains an issue in handling Geolocation API, which may result in the disclosure of a user's location.
Products Affected
- Sleipnir Mobile for Android 2.12.1 and earlier
- Sleipnir Mobile for Android Black Edition 2.12.1 and earlier
Description
Sleipnir Mobile for Android is a web browser for Android devices. Sleipnir Mobile for Android contains an issue in handling Geolocation
API, which may result in the disclosure of a user's location.
Impact
When a website that a user is viewing requests the user's location information, Sleipnir Mobile for Android sends a user's location to the website without obtaining the user's consent.
Solution
Update the software
Update to the latest version according to the information provided by the developer.
Vendor Status
References
-
W3C - Geolocation API Specification
4.1 Privacy considerations for implementers of the Geolocation API
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Analyzed on 2014.01.22
Measures | Conditions | Severity |
---|---|---|
Access Required | can be attacked over the Internet using packets |
|
Authentication | anonymous or no authentication (IP addresses do not count) |
|
User Interaction Required | the vulnerability can be exploited without an honest user taking any action |
|
Exploit Complexity | some expertise and/or luck required (most buffer overflows, guessing correctly in small space, expertise in Windows function calls) |
|
Credit
Ryoji Tamura reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert | |
JPCERT Reports | |
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2014-0806 |
JVN iPedia |
JVNDB-2014-000007 |