ID

VAR-201201-0278


CVE

CVE-2011-4697


TITLE

Android for Xiaomi MiTalk Messenger Vulnerable to reading messaging information

Trust: 0.8

sources: JVNDB: JVNDB-2012-001202

DESCRIPTION

The Xiaomi MiTalk Messenger (com.xiaomi.channel) application before 2.1.320 for Android does not properly protect data, which allows remote attackers to read or modify messaging information via a crafted application. MiTalk is prone to a remote unauthorized access vulnerability. An attacker can exploit this issue to gain access to contacts, certain SMS data, buddy information, and to manipulate data. MiTalk 1.0, 2.1.280, and 2.1.310 are affected; other versions may also be vulnerable. Google Chrome is a web browser developed by Google (Google). Android is a Linux-based open source operating system jointly developed by Google and the Open Handheld Alliance (OHA). ---------------------------------------------------------------------- Secunia is hiring! Find your next job here: http://secunia.com/company/jobs/ ---------------------------------------------------------------------- TITLE: MiTalk Messenger for Android Security Bypass Security Issue SECUNIA ADVISORY ID: SA47767 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/47767/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=47767 RELEASE DATE: 2012-02-01 DISCUSS ADVISORY: http://secunia.com/advisories/47767/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/47767/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=47767 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: AppSec has reported a security issue in MiTalk Messenger for Android, which can be exploited by malicious people to bypass certain security restrictions. The security issue is caused due to an unspecified error and can be exploited to disclose certain sensitive information like e.g. Successful exploitation requires that a malicious application is installed. The security issue is reported in versions 2.1.280 and 2.1.310. SOLUTION: Reportedly fixed in the version released on 5th December 2011. PROVIDED AND/OR DISCOVERED BY: Daoyuan Wu, Xiapu Luo, and Rocky K. C. Chang Department of Computing, The Hong Kong Polytechnic University ORIGINAL ADVISORY: http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2011-4697-vulnerability-in-MiTalk.html OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.16

sources: NVD: CVE-2011-4697 // JVNDB: JVNDB-2012-001202 // BID: 51697 // VULHUB: VHN-52642 // VULMON: CVE-2011-4697 // PACKETSTORM: 109321

AFFECTED PRODUCTS

vendor:xiaomimodel:mitalk messengerscope:eqversion:2.1.280

Trust: 1.9

vendor:xiaomimodel:mitalk messengerscope:eqversion:1.0

Trust: 1.6

vendor:xiaomimodel:mitalk messengerscope:lteversion:2.1.310

Trust: 1.0

vendor:xiaomimodel:mitalk messengerscope:eqversion:2.1.310

Trust: 0.9

vendor:xiaomimodel:mitalk messengerscope:ltversion:2.1.320

Trust: 0.8

sources: BID: 51697 // JVNDB: JVNDB-2012-001202 // CNNVD: CNNVD-201201-343 // NVD: CVE-2011-4697

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-4697
value: MEDIUM

Trust: 1.0

NVD: CVE-2011-4697
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201201-343
value: MEDIUM

Trust: 0.6

VULHUB: VHN-52642
value: MEDIUM

Trust: 0.1

VULMON: CVE-2011-4697
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2011-4697
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-52642
severity: MEDIUM
baseScore: 6.4
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-52642 // VULMON: CVE-2011-4697 // JVNDB: JVNDB-2012-001202 // CNNVD: CNNVD-201201-343 // NVD: CVE-2011-4697

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.9

sources: VULHUB: VHN-52642 // JVNDB: JVNDB-2012-001202 // NVD: CVE-2011-4697

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201201-343

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201201-343

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-001202

PATCH

title:Top Pageurl:http://www.xiaomi.com

Trust: 0.8

title:miliao-100_1_androidurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=42487

Trust: 0.6

sources: JVNDB: JVNDB-2012-001202 // CNNVD: CNNVD-201201-343

EXTERNAL IDS

db:NVDid:CVE-2011-4697

Trust: 3.0

db:JVNDBid:JVNDB-2012-001202

Trust: 0.8

db:CNNVDid:CNNVD-201201-343

Trust: 0.7

db:BIDid:51697

Trust: 0.5

db:SECUNIAid:47767

Trust: 0.2

db:VULHUBid:VHN-52642

Trust: 0.1

db:VULMONid:CVE-2011-4697

Trust: 0.1

db:PACKETSTORMid:109321

Trust: 0.1

sources: VULHUB: VHN-52642 // VULMON: CVE-2011-4697 // BID: 51697 // JVNDB: JVNDB-2012-001202 // PACKETSTORM: 109321 // CNNVD: CNNVD-201201-343 // NVD: CVE-2011-4697

REFERENCES

url:http://www4.comp.polyu.edu.hk/~appsec/bugs/cve-2011-4697-vulnerability-in-mitalk.html

Trust: 3.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4697

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-4697

Trust: 0.8

url:http://www.xiaomi.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/200.html

Trust: 0.1

url:https://www.securityfocus.com/bid/51697

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:http://secunia.com/company/jobs/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=47767

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/advisories/47767/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/47767/

Trust: 0.1

sources: VULHUB: VHN-52642 // VULMON: CVE-2011-4697 // BID: 51697 // JVNDB: JVNDB-2012-001202 // PACKETSTORM: 109321 // CNNVD: CNNVD-201201-343 // NVD: CVE-2011-4697

CREDITS

Daoyuan Wu, Xiapu Luo, and Rocky K. C. Chang Department of Computing, The Hong Kong Polytechnic University

Trust: 0.3

sources: BID: 51697

SOURCES

db:VULHUBid:VHN-52642
db:VULMONid:CVE-2011-4697
db:BIDid:51697
db:JVNDBid:JVNDB-2012-001202
db:PACKETSTORMid:109321
db:CNNVDid:CNNVD-201201-343
db:NVDid:CVE-2011-4697

LAST UPDATE DATE

2024-11-23T22:56:44.965000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-52642date:2012-01-25T00:00:00
db:VULMONid:CVE-2011-4697date:2012-01-25T00:00:00
db:BIDid:51697date:2012-02-01T00:00:00
db:JVNDBid:JVNDB-2012-001202date:2012-01-27T00:00:00
db:CNNVDid:CNNVD-201201-343date:2012-01-31T00:00:00
db:NVDid:CVE-2011-4697date:2024-11-21T01:32:48.437

SOURCES RELEASE DATE

db:VULHUBid:VHN-52642date:2012-01-25T00:00:00
db:VULMONid:CVE-2011-4697date:2012-01-25T00:00:00
db:BIDid:51697date:2012-02-01T00:00:00
db:JVNDBid:JVNDB-2012-001202date:2012-01-27T00:00:00
db:PACKETSTORMid:109321date:2012-02-01T05:20:05
db:CNNVDid:CNNVD-201201-343date:2012-01-31T00:00:00
db:NVDid:CVE-2011-4697date:2012-01-25T04:03:27.580