Vulnerability CVE-2012-3886


Published: 2012-07-26   Modified: 2012-07-27

Description:
AirDroid 1.0.4 beta uses the MD5 algorithm for values in the checklogin key parameter and 7bb cookie, which makes it easier for remote attackers to obtain cleartext data by sniffing the local wireless network and then conducting a (1) brute-force attack or (2) rainbow-table attack.

See advisories in our WLB2 database:
Topic
Author
Date
High
AirDroid 1.0.4 several weaknesses
tele-consulting
07.08.2012

Type:

CWE-200

(Information Exposure)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Airdroid -> Airdroid 

 References:
http://www.tele-consulting.com/advisories/TC-SA-2012-02.txt
http://archives.neohapsis.com/archives/bugtraq/2012-07/0087.html

Copyright 2024, cxsecurity.com

 

Back to Top