The DISH Anywhere (aka com.sm.SlingGuide.Dish) application 3.5.10 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/582497 | Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/889617 | US Government Resource |
https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing | |
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html |
Configurations
Information
Published : 2014-09-09 03:55
Updated : 2016-06-16 19:00
NVD link : CVE-2014-5704
Mitre link : CVE-2014-5704
JSON object : View
CWE
CWE-310
Cryptographic Issues
Products Affected
dish
- dish_anywhere