The Flurry library before 3.4.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
References
Link | Resource |
---|---|
http://www.fireeye.com/blog/technical/2014/08/ssl-vulnerabilities-who-listens-when-android-applications-talk.html | |
http://www.kb.cert.org/vuls/id/208585 | US Government Resource |
http://www.kb.cert.org/vuls/id/582497 | Third Party Advisory US Government Resource |
https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing |
Configurations
Configuration 1 (hide)
|
Information
Published : 2014-09-08 18:55
Updated : 2014-09-11 19:06
NVD link : CVE-2014-6024
Mitre link : CVE-2014-6024
JSON object : View
CWE
CWE-310
Cryptographic Issues
Products Affected
flurry
- flurry-analytics-android