The Chartboost library before 2.0.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
References
Link | Resource |
---|---|
http://www.fireeye.com/blog/technical/2014/08/ssl-vulnerabilities-who-listens-when-android-applications-talk.html | |
http://www.kb.cert.org/vuls/id/582497 | Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/775305 | US Government Resource |
https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2014-09-09T10:00:00
Updated: 2014-09-09T02:57:00
Reserved: 2014-08-31T00:00:00
Link: CVE-2014-6025
JSON object: View
NVD Information
Status : Analyzed
Published: 2014-09-09T10:55:17.160
Modified: 2014-09-21T22:07:34.837
Link: CVE-2014-6025
JSON object: View
Redhat Information
No data.
CWE