|
Message-Id: <201101040209.20874.hanno@hboeck.de>
Date: Tue, 4 Jan 2011 02:09:20 +0100
From: Hanno Böck <hanno@...eck.de>
To: oss-security@...ts.openwall.com
Subject: CVE request: AusweisApp
The "AusweisApp" is an official government application for the electronic ID
in germany.
The original version contained a vulnerability in the update function. It
didn't verify the host of the https connection and allowed to install
malicious files through a directory traversal vuln in the used unzip
routine.
I'm not sure if this makes one or two CVEs, as there are two "vulns" that
can only be used together to do malicious things.
Original source:
https://janschejbal.wordpress.com/2010/11/09/ausweisapp-gehackt-malware-uber-autoupdate/
Also, the versioning is a bit broken, the article claims that the version
was both 1.0.0 and 1.0.1 depending on the source, but the new "fixed" version
is also called 1.0:
https://www.ausweisapp.bund.de/
--
Hanno Böck Blog: http://www.hboeck.de/
GPG: 3DBD3B20 Jabber/Mail: hanno@...eck.de
http://schokokeks.org - professional webhosting
Download attachment "signature.asc " of type "application/pgp-signature" (199 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.