AirDroid 1.0.4 beta uses the MD5 algorithm for values in the checklogin key parameter and 7bb cookie, which makes it easier for remote attackers to obtain cleartext data by sniffing the local wireless network and then conducting a (1) brute-force attack or (2) rainbow-table attack.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2012-07/0087.html | Exploit |
http://www.tele-consulting.com/advisories/TC-SA-2012-02.txt | Exploit |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2022-10-03T16:15:22
Updated: 2022-10-03T16:15:22
Reserved: 2022-10-03T00:00:00
Link: CVE-2012-3886
JSON object: View
NVD Information
Status : Analyzed
Published: 2012-07-26T22:55:01.793
Modified: 2012-07-27T13:48:13.463
Link: CVE-2012-3886
JSON object: View
Redhat Information
No data.
CWE