The DISH Anywhere (aka com.sm.SlingGuide.Dish) application 3.5.10 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
References
Link | Resource |
---|---|
http://www.kb.cert.org/vuls/id/582497 | Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/889617 | US Government Resource |
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html | |
https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing |
Configurations
History
No history.
Information
Published : 2014-09-09 10:55
Updated : 2024-02-28 12:20
NVD link : CVE-2014-5704
Mitre link : CVE-2014-5704
CVE.ORG link : CVE-2014-5704
JSON object : View
Products Affected
dish
- dish_anywhere
CWE
CWE-310
Cryptographic Issues