2 results (0.004 seconds)

CVSS: 6.4EPSS: 0%CPEs: 39EXPL: 0

The HTC IQRD service for Android on the HTC EVO 4G before 4.67.651.3, EVO Design 4G before 2.12.651.5, Shift 4G before 2.77.651.3, EVO 3D before 2.17.651.5, EVO View 4G before 2.23.651.1, Vivid before 3.26.502.56, and Hero does not restrict localhost access to TCP port 2479, which allows remote attackers to (1) send SMS messages, (2) obtain the Network Access Identifier (NAI) and its password, or trigger (3) popup messages or (4) tones via a crafted application that leverages the android.permission.INTERNET permission. El servicio HTC IQRD para Android en HTC EVO 4G antes de v4.67.651.3, EVO Design 4G antes de v2.12.651.5, Shift 4G antes de v2.77.651.3, EVO 3D antes de v2.17.651.5, EVO View 4G antes de v2.23.651.1, Vivid antes de v3.26.502.56, y Hero no restringe el acceso a localhost en el puerto TCP 2479, lo que permite a atacantes remotos (1) enviar mensajes SMS, (2) obtener el identificador de acceso a la red (NAI) y su contraseña, o lanzar (3) mensajes emergentes o (4) tonos a través de una aplicación modificada que aprovecha el permiso android.permission.INTERNET. • http://archives.neohapsis.com/archives/bugtraq/2012-04/0176.html http://www.securityfocus.com/bid/53187 http://www.vsecurity.com/resources/advisory/20120420-1 https://exchange.xforce.ibmcloud.com/vulnerabilities/75080 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 2.6EPSS: 0%CPEs: 10EXPL: 0

Multiple HTC Android devices including Desire HD FRG83D and GRI40, Glacier FRG83, Droid Incredible FRF91, Thunderbolt 4G FRG83D, Sensation Z710e GRI40, Sensation 4G GRI40, Desire S GRI40, EVO 3D GRI40, and EVO 4G GRI40 allow remote attackers to obtain 802.1X Wi-Fi credentials and SSID via a crafted application that uses the android.permission.ACCESS_WIFI_STATE permission to call the toString method on the WifiConfiguration class. Múltiples dispositivos Android HTC incluyendo Desire HD FRG83D y GRI40, Glacier FRG83, Droid Incredible FRF91, Thunderbolt 4G FRG83D, Sensation Z710e GRI40, Sensation 4G GRI40, Desire S GRI40, EVO 3D GRI40 y EVO 4G GRI40 permiten a atacantes remotos obtener las credenciales Wi-Fi 802.1X y el SSID a través de una aplicación modificada que utiliza el permiso android.permission.ACCESS_WIFI_STATE para invocar el método toString en la clase WifiConfiguration. • http://archives.neohapsis.com/archives/bugtraq/2012-02/0002.html http://blog.mywarwithentropy.com/2012/02/8021x-password-exploit-on-many-htc.html http://secunia.com/advisories/47837 http://www.kb.cert.org/vuls/id/763355 http://www.securityfocus.com/bid/51790 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •