The familyconnect (aka com.comcast.plaxo.familyconnect.app) application 1.5.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/334425 | US Government Resource |
http://www.kb.cert.org/vuls/id/582497 | Third Party Advisory US Government Resource |
https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing |
Configurations
History
No history.
Information
Published : 2014-09-09 01:55
Updated : 2024-02-28 12:20
NVD link : CVE-2014-5600
Mitre link : CVE-2014-5600
CVE.ORG link : CVE-2014-5600
JSON object : View
Products Affected
familyconnect_project
- familyconnect
CWE
CWE-310
Cryptographic Issues