Published:2014/09/19  Last Updated:2014/09/19

JVN#08994136
Bump for Android vulnerable in handling of implicit intents

Overview

Bump for Android contains a vulnerability in the handling of implicit intents.

Products Affected

  • Bump for Android

Description

Bump for Android is an application that allows users to share information and files. Bump for Android contains a vulnerability in the handling of implicit intents.

Impact

Information such as the owner's name that was obtained from another device may be disclosed.

Solution

Do not use Bump for Android
According to the developer, Bump is no longer being developed or maintained, thus it is recommended to stop using the product.

Vendor Status

Vendor Link
Bump Technologies, Inc. Bump Blog - All Good Things...

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Analyzed on 2014.09.19 (CVSS Base Metrics)

What is CVSS?

Measures Severity Description
Access Vector(AV) Local (L) Adjacent Network (A) Network (N) A vulnerability exploitable with network access means the vulnerable software is bound to the network stack and the attacker does not require local network access or local access. Such a vulnerability is often termed "remotely exploitable".
Access Complexity(AC) High (H) Medium (M) Low (L) Specialized access conditions exist.
Authentication(Au) Multiple (M) Single (S) None (N) Authentication is not required to exploit the vulnerability.
Confidentiality Impact(C) None (N) Partial (P) Complete (C) There is considerable informational disclosure. Access to some system files is possible, but the attacker does not have control over what is obtained, or the scope of the loss is constrained.
Integrity Impact(I) None (N) Partial (P) Complete (C) There is no impact to the integrity of the system.
Availability Impact(A) None (N) Partial (P) Complete (C) There is no impact to the availability of the system.

Base Score:2.6

Credit

Gaku Mochizuki of Mitsui Bussan Secure Directions, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2014-5320
JVN iPedia JVNDB-2014-000109