Информационная безопасность
[RU] switch to English


Дополнительная информация

  Уязвимости безопасности в различных приложениях под iOS / Android

  Re: CVE-2015-5204: HTTP header injection vulnerability in Apache Cordova File Transfer Plugin for Android

  Photos in Wifi v1.0.1 iOS - Arbitrary File Upload Vulnerability

  My.WiFi USB Drive v1.0 iOS - File Include Vulnerability

  WiFi Drive CR v1.0 iOS - Persistent Filename Dir List Vulnerability

From:David Coomber <davidcoomber.infosec_(at)_gmail.com>
Date:14 сентября 2015 г.
Subject:Webroot SecureAnywhere Mobile Protection - MITM SSL Certificate Vulnerability



Webroot SecureAnywhere Mobile Protection - MITM SSL Certificate Vulnerability
--
http://www.info-sec.ca/advisories/Webroot-SecureAnywhere.html

Overview

"Webroot SecureAnywhere Business – Mobile Protection provides
essential security for iPhones and iPads and includes lost device
protection that allows administrators to remotely locate the device,
make the device scream and lock or wipe the device if it’s misplaced
or stolen. The Webroot mobile device security console provides central
management and inventory controls to IT professionals securing their
mobile workforce."

(https://itunes.apple.com/us/app/mobile-protection/id565693635)

Issue

The Webroot SecureAnywhere Business – Mobile Protection iOS
application (version 1.10.316 and below) does not validate the SSL
certificate it receives when connecting to a secure site.

Impact

An attacker who can perform a man in the middle attack may present a
bogus SSL certificate which the application will accept silently.
Usernames, passwords and sensitive information could be captured by an
attacker without the user's knowledge.

Timeline

August 2, 2015 - Notified Webroot via [email protected] & [email protected]
August 3, 2015 - Webroot responded saying that the 'limitation' would
be addressed in an upcoming version
August 3, 2015 - Asked Webroot for a timeline to provide an updated version
August 31, 2015 - Webroot released version 1.11 which resolves this
vulnerability

Solution

Upgrade to version 1.11 or later

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород