Date: Tue, 4 Jan 2011 02:09:20 +0100 From: Hanno Böck <hanno@...eck.de> To: oss-security@...ts.openwall.com Subject: CVE request: AusweisApp The "AusweisApp" is an official government application for the electronic ID in germany. The original version contained a vulnerability in the update function. It didn't verify the host of the https connection and allowed to install malicious files through a directory traversal vuln in the used unzip routine. I'm not sure if this makes one or two CVEs, as there are two "vulns" that can only be used together to do malicious things. Original source: https://janschejbal.wordpress.com/2010/11/09/ausweisapp-gehackt-malware-uber-autoupdate/ Also, the versioning is a bit broken, the article claims that the version was both 1.0.0 and 1.0.1 depending on the source, but the new "fixed" version is also called 1.0: https://www.ausweisapp.bund.de/ -- Hanno Böck Blog: http://www.hboeck.de/ GPG: 3DBD3B20 Jabber/Mail: hanno@...eck.de http://schokokeks.org - professional webhosting Download attachment "signature.asc " of type "application/pgp-signature" (199 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.