|
Message-Id: <201402181925.s1IJP8IE007255@linus.mitre.org> Date: Tue, 18 Feb 2014 14:25:08 -0500 (EST) From: cve-assign@...re.org To: nnk@...gle.com Cc: cve-assign@...re.org, oss-security@...ts.openwall.com, oss-sec-addjsif@...p.org Subject: Re: CVE-2014-1939 searchBoxJavaBridge_ in Android Jelly Bean -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > This particular issue was previously assigned a CVE by JPCERT, > specifically, CVE-2013-4710. See > https://jvn.jp/en/jp/JVN53768697/index.html for additional > information. > > CVE-2014-1939 should be marked as a DUPLICATE of CVE-2013-4710. Thanks for sending this note. To provide an initial response to this: MITRE will look into the relationships among CVE-2013-4710, CVE-2012-6636, and CVE-2014-1939, but at this point has not accepted the statement that CVE-2014-1939 must be marked as a duplicate. Again, from: http://openwall.com/lists/oss-security/2014/02/08/8 http://www.cs.utexas.edu/~shmat/shmat_ndss14nofrak.pdf The scope of CVE-2012-6636 is the following description of a specific change made by a vendor in response to a vulnerability: On Android prior to API level 17, these interfaces are generically insecure. Malicious JavaScript executing inside WebView can use the Java reflection API to invoke any method of any Java object exposed via 'addJavascriptInterface' and take control over the local side of the application. Starting from Android API level 17, only the methods explicitly annotated with @JavascriptInterface are visible in the Java objects exposed to WebView via 'addJavascriptInterface'. The scope of CVE-2014-1939 is only the role of the searchBoxJavaBridge_ object as a specific attackable object. The outcome with respect to CVE-2013-4710 will depend on several factors, including MITRE's assessment of whether the wider community has been using CVE-2013-4710 for purposes other than tracking updates offered by Japanese handset manufacturers. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJTA7LvAAoJEKllVAevmvmsoXcIAJNmDl9GfZdeidK/dIFPNxe3 UP3W5zlu1oOWTf9/zqNc+VHFQiTAcKNwLQ4Ri35Y7ZEX33QUX4+YPsjWxMJKZGbG Sp+yRK6JZD4uA5JrlBH12RwGuus+O8Kx1fAvED2pbHxQqiqiISWdxhwtFh6y86G5 91GWmD8Y2QLlRE5jSG8eZXf8QsiLrLGsAohgQBmAeFMNk7zfiZUXI9xF5Hq0n8Xq l/JVti84lMyR8dFwTbg99+ZjrVJA2f29q7ZUt1k9vfDCtg7Meo/X9GcenKzvG8tr 970AHWZMb9cxEf+7fvprRJ/wXIaAri4wJyqc58/jT0cb972u7iTt2Lvq9/axOYc= =TFYk -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.