Search criteria
12 vulnerabilities found for spmode_mail_android by nttdocomo
FKIE_CVE-2014-1977
Vulnerability from fkie_nvd - Published: 2014-03-19 14:17 - Updated: 2025-04-12 10:46
Severity ?
Summary
The NTT DOCOMO sp mode mail application 6300 and earlier for Android 4.0.x and 6700 and earlier for Android 4.1 through 4.4 uses weak permissions for attachments during processing of incoming e-mail messages, which allows attackers to obtain sensitive information via a crafted application.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:*:*:*:*:*:android:*:*",
"matchCriteriaId": "54A62BDA-611F-4C30-B31C-3A22EBADC915",
"versionEndIncluding": "6300",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:2546:*:*:*:*:*:*:*",
"matchCriteriaId": "B6D674F3-B9B0-4E04-882A-1A99E8D64BC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:2631:*:*:*:*:*:*:*",
"matchCriteriaId": "05A86980-2D42-4CDB-95F4-35ED3F1EAE75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:3000:*:*:*:*:*:*:*",
"matchCriteriaId": "607E5791-C8A5-43FC-9C95-6F1403A1C45A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:3100:*:*:*:*:*:*:*",
"matchCriteriaId": "D2AC61F7-11EE-4867-9817-3DAA3BC6C1F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:3200:*:*:*:*:*:*:*",
"matchCriteriaId": "2F3544EA-464C-42F6-AF72-ACB58668284A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:3300:*:*:*:*:*:*:*",
"matchCriteriaId": "ED607719-C78B-4716-A531-20E292BCB496",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:3400:*:*:*:*:*:*:*",
"matchCriteriaId": "B640DDD3-50EC-4E8B-87A7-5E49837C663C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4000:*:*:*:*:*:*:*",
"matchCriteriaId": "34AD600E-05D6-4AEE-9DC8-5DCBD0172262",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4200:*:*:*:*:*:*:*",
"matchCriteriaId": "FA995ABD-6B2B-4808-9546-9553940A2A08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4300:*:*:*:*:*:*:*",
"matchCriteriaId": "1593F4B2-3B53-490E-8E15-84FC0514D4AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4400:*:*:*:*:*:*:*",
"matchCriteriaId": "AE566215-3A8D-4311-99D1-B6E07CE46479",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4500:*:*:*:*:*:*:*",
"matchCriteriaId": "0256B6C8-E7D2-48A1-B4A8-82437D20B813",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4600:*:*:*:*:*:*:*",
"matchCriteriaId": "76B81BE2-B462-48BD-8641-0E36639073F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4700:*:*:*:*:*:*:*",
"matchCriteriaId": "CC452E75-380E-41C8-9081-08DCD806EA28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4800:*:*:*:*:*:*:*",
"matchCriteriaId": "EC44F338-BF16-402B-AB03-7FABE1457DC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4900:*:*:*:*:*:*:*",
"matchCriteriaId": "D0E8AC52-F7B1-4FDE-B146-1C4DACD0AB64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5000:*:*:*:*:*:*:*",
"matchCriteriaId": "9BC15FCC-22F4-4BD5-8F8F-7BA73BB24531",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5100:*:*:*:*:*:*:*",
"matchCriteriaId": "8967289A-8DEE-4456-A089-B3239D88C3BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5200:*:*:*:*:*:*:*",
"matchCriteriaId": "EA37E3D6-87C3-4CB2-A16F-18AB9CA9A31C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5300:*:*:*:*:*:*:*",
"matchCriteriaId": "42AFE304-60F2-413C-8953-A7B16DB52C01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5400:*:*:*:*:*:*:*",
"matchCriteriaId": "3D9A41DC-F103-4B41-87D2-2BA41B1EBEDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5500:*:*:*:*:*:*:*",
"matchCriteriaId": "DA76F398-B411-412B-9746-D15E08E73C0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5550:*:*:*:*:*:*:*",
"matchCriteriaId": "CD1F93A3-B514-4426-9DD1-8D34AB8D4F8A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:*:*:*:*:*:android:*:*",
"matchCriteriaId": "44C3C6B2-F151-49F9-8AEE-3B7AA0D142D3",
"versionEndIncluding": "6700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:2546:*:*:*:*:*:*:*",
"matchCriteriaId": "B6D674F3-B9B0-4E04-882A-1A99E8D64BC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:2631:*:*:*:*:*:*:*",
"matchCriteriaId": "05A86980-2D42-4CDB-95F4-35ED3F1EAE75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:3000:*:*:*:*:*:*:*",
"matchCriteriaId": "607E5791-C8A5-43FC-9C95-6F1403A1C45A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:3100:*:*:*:*:*:*:*",
"matchCriteriaId": "D2AC61F7-11EE-4867-9817-3DAA3BC6C1F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:3200:*:*:*:*:*:*:*",
"matchCriteriaId": "2F3544EA-464C-42F6-AF72-ACB58668284A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:3300:*:*:*:*:*:*:*",
"matchCriteriaId": "ED607719-C78B-4716-A531-20E292BCB496",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:3400:*:*:*:*:*:*:*",
"matchCriteriaId": "B640DDD3-50EC-4E8B-87A7-5E49837C663C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4000:*:*:*:*:*:*:*",
"matchCriteriaId": "34AD600E-05D6-4AEE-9DC8-5DCBD0172262",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4200:*:*:*:*:*:*:*",
"matchCriteriaId": "FA995ABD-6B2B-4808-9546-9553940A2A08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4300:*:*:*:*:*:*:*",
"matchCriteriaId": "1593F4B2-3B53-490E-8E15-84FC0514D4AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4400:*:*:*:*:*:*:*",
"matchCriteriaId": "AE566215-3A8D-4311-99D1-B6E07CE46479",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4500:*:*:*:*:*:*:*",
"matchCriteriaId": "0256B6C8-E7D2-48A1-B4A8-82437D20B813",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4600:*:*:*:*:*:*:*",
"matchCriteriaId": "76B81BE2-B462-48BD-8641-0E36639073F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4700:*:*:*:*:*:*:*",
"matchCriteriaId": "CC452E75-380E-41C8-9081-08DCD806EA28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4800:*:*:*:*:*:*:*",
"matchCriteriaId": "EC44F338-BF16-402B-AB03-7FABE1457DC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4900:*:*:*:*:*:*:*",
"matchCriteriaId": "D0E8AC52-F7B1-4FDE-B146-1C4DACD0AB64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5000:*:*:*:*:*:*:*",
"matchCriteriaId": "9BC15FCC-22F4-4BD5-8F8F-7BA73BB24531",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5100:*:*:*:*:*:*:*",
"matchCriteriaId": "8967289A-8DEE-4456-A089-B3239D88C3BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5200:*:*:*:*:*:*:*",
"matchCriteriaId": "EA37E3D6-87C3-4CB2-A16F-18AB9CA9A31C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5300:*:*:*:*:*:*:*",
"matchCriteriaId": "42AFE304-60F2-413C-8953-A7B16DB52C01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5400:*:*:*:*:*:*:*",
"matchCriteriaId": "3D9A41DC-F103-4B41-87D2-2BA41B1EBEDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5500:*:*:*:*:*:*:*",
"matchCriteriaId": "DA76F398-B411-412B-9746-D15E08E73C0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5550:*:*:*:*:*:*:*",
"matchCriteriaId": "CD1F93A3-B514-4426-9DD1-8D34AB8D4F8A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6CD857E7-B878-49F9-BDDA-93DDEBB0B42B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FBDABB6C-FFF9-4E79-9EF1-BDC0BBDEA9F1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A47AB858-36DE-4330-8CAC-1B46C5C8DA80",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "49413FF7-7910-4F74-B106-C3170612CB2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A2467F65-A3B7-4E45-A9A5-E5A6EFD99D7B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A8882E50-7C49-4A99-91F2-DF979CF8BB2F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "98C32982-095C-4628-9958-118A3D3A9CAA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The NTT DOCOMO sp mode mail application 6300 and earlier for Android 4.0.x and 6700 and earlier for Android 4.1 through 4.4 uses weak permissions for attachments during processing of incoming e-mail messages, which allows attackers to obtain sensitive information via a crafted application."
},
{
"lang": "es",
"value": "La aplicaci\u00f3n de correo NTT DOCOMO sp mode 6300 y anteriores para Android 4.0.x y 6700 y anteriores para Android 4.1 hasta 4.4 utiliza permisos d\u00e9biles para adjuntos durante el procesamiento de mensajes email entrantes, lo que permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de una aplicaci\u00f3n manipulada."
}
],
"id": "CVE-2014-1977",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-03-19T14:17:45.070",
"references": [
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvn.jp/en/jp/JVN81739241/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000027"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN81739241/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000027"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-1978
Vulnerability from fkie_nvd - Published: 2014-03-19 14:17 - Updated: 2025-04-12 10:46
Severity ?
Summary
The application link interface in the NTT DOCOMO sp mode mail application 6100 through 6300 for Android 4.0.x and 6130 through 6700 for Android 4.1 through 4.4 writes message content to the SD card during e-mail composition, which allows attackers to obtain sensitive information via a crafted application.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| nttdocomo | spmode_mail_android | 6100 | |
| nttdocomo | spmode_mail_android | 6300 | |
| android | 4.0 | ||
| android | 4.0.1 | ||
| android | 4.0.2 | ||
| android | 4.0.3 | ||
| android | 4.0.4 | ||
| nttdocomo | spmode_mail_android | 6130 | |
| nttdocomo | spmode_mail_android | 6700 | |
| android | 4.1 | ||
| android | 4.1.2 | ||
| android | 4.2 | ||
| android | 4.2.1 | ||
| android | 4.2.2 | ||
| android | 4.3 | ||
| android | 4.3.1 | ||
| android | 4.4 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:6100:*:*:*:*:android:*:*",
"matchCriteriaId": "4B2B7E7F-9D73-42B8-BC76-33D7243024F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:6300:*:*:*:*:android:*:*",
"matchCriteriaId": "D24242AD-2016-488F-9FC9-76210F05B861",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:6130:*:*:*:*:android:*:*",
"matchCriteriaId": "266A416B-CD5B-4621-A311-6E42EC2FB88F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:6700:*:*:*:*:android:*:*",
"matchCriteriaId": "9F62E0A1-3F6D-41A1-B0F8-E57026A67B26",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6CD857E7-B878-49F9-BDDA-93DDEBB0B42B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FBDABB6C-FFF9-4E79-9EF1-BDC0BBDEA9F1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A47AB858-36DE-4330-8CAC-1B46C5C8DA80",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "49413FF7-7910-4F74-B106-C3170612CB2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A2467F65-A3B7-4E45-A9A5-E5A6EFD99D7B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A8882E50-7C49-4A99-91F2-DF979CF8BB2F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "98C32982-095C-4628-9958-118A3D3A9CAA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The application link interface in the NTT DOCOMO sp mode mail application 6100 through 6300 for Android 4.0.x and 6130 through 6700 for Android 4.1 through 4.4 writes message content to the SD card during e-mail composition, which allows attackers to obtain sensitive information via a crafted application."
},
{
"lang": "es",
"value": "La interfaz de enlace de aplicaci\u00f3n en la aplicaci\u00f3n de correo NTT DOCOMO sp mode 6100 hasta 6300 para Android 4.0.x y 6130 hasta 6700 para Android 4.1 hasta 4.4 escribe contenido de mensajes en la tarjeta SD durante la composici\u00f3n de email, lo que permite a atacantes obtener informaci\u00f3n sensible a trav\u00e9s de una aplicaci\u00f3n manipulada."
}
],
"id": "CVE-2014-1978",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-03-19T14:17:45.103",
"references": [
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvn.jp/en/jp/JVN05951929/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000028"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN05951929/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000028"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-1979
Vulnerability from fkie_nvd - Published: 2014-03-19 14:17 - Updated: 2025-04-12 10:46
Severity ?
Summary
The NTT DOCOMO sp mode mail application 5900 through 6300 for Android 4.0.x and 6000 through 6620 for Android 4.1 through 4.4 allows remote attackers to execute arbitrary Java methods via Deco-mail emoticon POP data in an e-mail message.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| nttdocomo | spmode_mail_android | 6000 | |
| nttdocomo | spmode_mail_android | 6200 | |
| nttdocomo | spmode_mail_android | 6620 | |
| android | 4.1 | ||
| android | 4.1.2 | ||
| android | 4.2 | ||
| android | 4.2.1 | ||
| android | 4.2.2 | ||
| android | 4.3 | ||
| android | 4.3.1 | ||
| android | 4.4 | ||
| nttdocomo | spmode_mail_android | 5900 | |
| nttdocomo | spmode_mail_android | 6000 | |
| nttdocomo | spmode_mail_android | 6200 | |
| nttdocomo | spmode_mail_android | 6300 | |
| android | 4.0 | ||
| android | 4.0.1 | ||
| android | 4.0.2 | ||
| android | 4.0.3 | ||
| android | 4.0.4 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:6000:*:*:*:*:android:*:*",
"matchCriteriaId": "B4D56149-DCF9-414E-A718-9DC5C2FB1106",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:6200:*:*:*:*:android:*:*",
"matchCriteriaId": "7FF44DAF-E177-4910-85D1-5A9FEDF18318",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:6620:*:*:*:*:android:*:*",
"matchCriteriaId": "42DCA324-A8D5-427E-A8AC-593AE8129FA7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6CD857E7-B878-49F9-BDDA-93DDEBB0B42B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FBDABB6C-FFF9-4E79-9EF1-BDC0BBDEA9F1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A47AB858-36DE-4330-8CAC-1B46C5C8DA80",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "49413FF7-7910-4F74-B106-C3170612CB2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A2467F65-A3B7-4E45-A9A5-E5A6EFD99D7B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A8882E50-7C49-4A99-91F2-DF979CF8BB2F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "98C32982-095C-4628-9958-118A3D3A9CAA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5900:*:*:*:*:android:*:*",
"matchCriteriaId": "A2C5ABA5-5F23-42C5-9B09-C8559DC417C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:6000:*:*:*:*:android:*:*",
"matchCriteriaId": "B4D56149-DCF9-414E-A718-9DC5C2FB1106",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:6200:*:*:*:*:android:*:*",
"matchCriteriaId": "7FF44DAF-E177-4910-85D1-5A9FEDF18318",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:6300:*:*:*:*:android:*:*",
"matchCriteriaId": "D24242AD-2016-488F-9FC9-76210F05B861",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93",
"vulnerable": false
},
{
"criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The NTT DOCOMO sp mode mail application 5900 through 6300 for Android 4.0.x and 6000 through 6620 for Android 4.1 through 4.4 allows remote attackers to execute arbitrary Java methods via Deco-mail emoticon POP data in an e-mail message."
},
{
"lang": "es",
"value": "La aplicaci\u00f3n de correo NTT DOCOMO sp mode 5900 hasta 6300 para Android 4.0.x y 6000 hasta 6620 para Android 4.1 hasta 4.4 permite a atacantes remotos ejecutar m\u00e9todos Java arbitrarios a trav\u00e9s de datos POP Deco-mail emoticon en un mensaje de email."
}
],
"id": "CVE-2014-1979",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2014-03-19T14:17:45.117",
"references": [
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvn.jp/en/jp/JVN89260331/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000029"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN89260331/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000029"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2012-1244
Vulnerability from fkie_nvd - Published: 2012-04-27 18:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The NTT DOCOMO sp mode mail application 5400 and earlier for Android does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| nttdocomo | spmode_mail_android | * | |
| nttdocomo | spmode_mail_android | 2546 | |
| nttdocomo | spmode_mail_android | 2631 | |
| nttdocomo | spmode_mail_android | 3000 | |
| nttdocomo | spmode_mail_android | 3100 | |
| nttdocomo | spmode_mail_android | 3200 | |
| nttdocomo | spmode_mail_android | 3300 | |
| nttdocomo | spmode_mail_android | 3400 | |
| nttdocomo | spmode_mail_android | 4000 | |
| nttdocomo | spmode_mail_android | 4200 | |
| nttdocomo | spmode_mail_android | 4300 | |
| nttdocomo | spmode_mail_android | 4400 | |
| nttdocomo | spmode_mail_android | 4500 | |
| nttdocomo | spmode_mail_android | 4600 | |
| nttdocomo | spmode_mail_android | 4700 | |
| nttdocomo | spmode_mail_android | 4800 | |
| nttdocomo | spmode_mail_android | 4900 | |
| nttdocomo | spmode_mail_android | 5000 | |
| nttdocomo | spmode_mail_android | 5100 | |
| nttdocomo | spmode_mail_android | 5200 | |
| nttdocomo | spmode_mail_android | 5300 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0B151C86-2D0E-49C0-8C04-1FA667BBB2DE",
"versionEndIncluding": "5400",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:2546:*:*:*:*:*:*:*",
"matchCriteriaId": "B6D674F3-B9B0-4E04-882A-1A99E8D64BC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:2631:*:*:*:*:*:*:*",
"matchCriteriaId": "05A86980-2D42-4CDB-95F4-35ED3F1EAE75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:3000:*:*:*:*:*:*:*",
"matchCriteriaId": "607E5791-C8A5-43FC-9C95-6F1403A1C45A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:3100:*:*:*:*:*:*:*",
"matchCriteriaId": "D2AC61F7-11EE-4867-9817-3DAA3BC6C1F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:3200:*:*:*:*:*:*:*",
"matchCriteriaId": "2F3544EA-464C-42F6-AF72-ACB58668284A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:3300:*:*:*:*:*:*:*",
"matchCriteriaId": "ED607719-C78B-4716-A531-20E292BCB496",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:3400:*:*:*:*:*:*:*",
"matchCriteriaId": "B640DDD3-50EC-4E8B-87A7-5E49837C663C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4000:*:*:*:*:*:*:*",
"matchCriteriaId": "34AD600E-05D6-4AEE-9DC8-5DCBD0172262",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4200:*:*:*:*:*:*:*",
"matchCriteriaId": "FA995ABD-6B2B-4808-9546-9553940A2A08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4300:*:*:*:*:*:*:*",
"matchCriteriaId": "1593F4B2-3B53-490E-8E15-84FC0514D4AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4400:*:*:*:*:*:*:*",
"matchCriteriaId": "AE566215-3A8D-4311-99D1-B6E07CE46479",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4500:*:*:*:*:*:*:*",
"matchCriteriaId": "0256B6C8-E7D2-48A1-B4A8-82437D20B813",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4600:*:*:*:*:*:*:*",
"matchCriteriaId": "76B81BE2-B462-48BD-8641-0E36639073F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4700:*:*:*:*:*:*:*",
"matchCriteriaId": "CC452E75-380E-41C8-9081-08DCD806EA28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4800:*:*:*:*:*:*:*",
"matchCriteriaId": "EC44F338-BF16-402B-AB03-7FABE1457DC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4900:*:*:*:*:*:*:*",
"matchCriteriaId": "D0E8AC52-F7B1-4FDE-B146-1C4DACD0AB64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5000:*:*:*:*:*:*:*",
"matchCriteriaId": "9BC15FCC-22F4-4BD5-8F8F-7BA73BB24531",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5100:*:*:*:*:*:*:*",
"matchCriteriaId": "8967289A-8DEE-4456-A089-B3239D88C3BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5200:*:*:*:*:*:*:*",
"matchCriteriaId": "EA37E3D6-87C3-4CB2-A16F-18AB9CA9A31C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5300:*:*:*:*:*:*:*",
"matchCriteriaId": "42AFE304-60F2-413C-8953-A7B16DB52C01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The NTT DOCOMO sp mode mail application 5400 and earlier for Android does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate."
},
{
"lang": "es",
"value": "La aplicaci\u00f3n de correo para Android NTT DoCoMo sp mode v5400 y anteriores no verifica correctamente los certificados X.509 de servidores SSL, lo que permite falsificar servidores a atacantes man-in-the-middle y obtener informaci\u00f3n sensible a trav\u00e9s de un certificado hecho a mano."
}
],
"id": "CVE-2012-1244",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2012-04-27T18:55:01.047",
"references": [
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvn.jp/en/jp/JVN82029095/index.html"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000037"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://osvdb.org/81629"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://secunia.com/advisories/48955"
},
{
"source": "vultures@jpcert.or.jp",
"url": "http://www.securityfocus.com/bid/53254"
},
{
"source": "vultures@jpcert.or.jp",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75159"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvn.jp/en/jp/JVN82029095/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000037"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/81629"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/48955"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/53254"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75159"
}
],
"sourceIdentifier": "vultures@jpcert.or.jp",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-310"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2014-1978 (GCVE-0-2014-1978)
Vulnerability from cvelistv5 – Published: 2014-03-19 14:00 – Updated: 2024-08-06 09:58
VLAI?
Summary
The application link interface in the NTT DOCOMO sp mode mail application 6100 through 6300 for Android 4.0.x and 6130 through 6700 for Android 4.1 through 4.4 writes message content to the SD card during e-mail composition, which allows attackers to obtain sensitive information via a crafted application.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:58:15.773Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVN#05951929",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN05951929/index.html"
},
{
"name": "JVNDB-2014-000028",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000028"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-03-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The application link interface in the NTT DOCOMO sp mode mail application 6100 through 6300 for Android 4.0.x and 6130 through 6700 for Android 4.1 through 4.4 writes message content to the SD card during e-mail composition, which allows attackers to obtain sensitive information via a crafted application."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-03-19T14:57:01",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVN#05951929",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN05951929/index.html"
},
{
"name": "JVNDB-2014-000028",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000028"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-1978",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The application link interface in the NTT DOCOMO sp mode mail application 6100 through 6300 for Android 4.0.x and 6130 through 6700 for Android 4.1 through 4.4 writes message content to the SD card during e-mail composition, which allows attackers to obtain sensitive information via a crafted application."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVN#05951929",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN05951929/index.html"
},
{
"name": "JVNDB-2014-000028",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000028"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2014-1978",
"datePublished": "2014-03-19T14:00:00",
"dateReserved": "2014-02-17T00:00:00",
"dateUpdated": "2024-08-06T09:58:15.773Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-1979 (GCVE-0-2014-1979)
Vulnerability from cvelistv5 – Published: 2014-03-19 14:00 – Updated: 2024-08-06 09:58
VLAI?
Summary
The NTT DOCOMO sp mode mail application 5900 through 6300 for Android 4.0.x and 6000 through 6620 for Android 4.1 through 4.4 allows remote attackers to execute arbitrary Java methods via Deco-mail emoticon POP data in an e-mail message.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:58:15.945Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVN#89260331",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN89260331/index.html"
},
{
"name": "JVNDB-2014-000029",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000029"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-03-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The NTT DOCOMO sp mode mail application 5900 through 6300 for Android 4.0.x and 6000 through 6620 for Android 4.1 through 4.4 allows remote attackers to execute arbitrary Java methods via Deco-mail emoticon POP data in an e-mail message."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-03-19T14:57:01",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVN#89260331",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN89260331/index.html"
},
{
"name": "JVNDB-2014-000029",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000029"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-1979",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The NTT DOCOMO sp mode mail application 5900 through 6300 for Android 4.0.x and 6000 through 6620 for Android 4.1 through 4.4 allows remote attackers to execute arbitrary Java methods via Deco-mail emoticon POP data in an e-mail message."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVN#89260331",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN89260331/index.html"
},
{
"name": "JVNDB-2014-000029",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000029"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2014-1979",
"datePublished": "2014-03-19T14:00:00",
"dateReserved": "2014-02-17T00:00:00",
"dateUpdated": "2024-08-06T09:58:15.945Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-1977 (GCVE-0-2014-1977)
Vulnerability from cvelistv5 – Published: 2014-03-19 14:00 – Updated: 2024-08-06 09:58
VLAI?
Summary
The NTT DOCOMO sp mode mail application 6300 and earlier for Android 4.0.x and 6700 and earlier for Android 4.1 through 4.4 uses weak permissions for attachments during processing of incoming e-mail messages, which allows attackers to obtain sensitive information via a crafted application.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:58:16.048Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVNDB-2014-000027",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000027"
},
{
"name": "JVN#81739241",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN81739241/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-03-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The NTT DOCOMO sp mode mail application 6300 and earlier for Android 4.0.x and 6700 and earlier for Android 4.1 through 4.4 uses weak permissions for attachments during processing of incoming e-mail messages, which allows attackers to obtain sensitive information via a crafted application."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-03-19T14:57:01",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVNDB-2014-000027",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000027"
},
{
"name": "JVN#81739241",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN81739241/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-1977",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The NTT DOCOMO sp mode mail application 6300 and earlier for Android 4.0.x and 6700 and earlier for Android 4.1 through 4.4 uses weak permissions for attachments during processing of incoming e-mail messages, which allows attackers to obtain sensitive information via a crafted application."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVNDB-2014-000027",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000027"
},
{
"name": "JVN#81739241",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN81739241/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2014-1977",
"datePublished": "2014-03-19T14:00:00",
"dateReserved": "2014-02-17T00:00:00",
"dateUpdated": "2024-08-06T09:58:16.048Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-1244 (GCVE-0-2012-1244)
Vulnerability from cvelistv5 – Published: 2012-04-27 18:00 – Updated: 2024-08-06 18:53
VLAI?
Summary
The NTT DOCOMO sp mode mail application 5400 and earlier for Android does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T18:53:36.364Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "spmode-android-ssl-spoofing(75159)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75159"
},
{
"name": "53254",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/53254"
},
{
"name": "JVN#82029095",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN82029095/index.html"
},
{
"name": "48955",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/48955"
},
{
"name": "81629",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/81629"
},
{
"name": "JVNDB-2012-000037",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000037"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-04-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The NTT DOCOMO sp mode mail application 5400 and earlier for Android does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-12-13T18:57:01",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "spmode-android-ssl-spoofing(75159)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75159"
},
{
"name": "53254",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/53254"
},
{
"name": "JVN#82029095",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN82029095/index.html"
},
{
"name": "48955",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/48955"
},
{
"name": "81629",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/81629"
},
{
"name": "JVNDB-2012-000037",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000037"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2012-1244",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The NTT DOCOMO sp mode mail application 5400 and earlier for Android does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "spmode-android-ssl-spoofing(75159)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75159"
},
{
"name": "53254",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/53254"
},
{
"name": "JVN#82029095",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN82029095/index.html"
},
{
"name": "48955",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48955"
},
{
"name": "81629",
"refsource": "OSVDB",
"url": "http://osvdb.org/81629"
},
{
"name": "JVNDB-2012-000037",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000037"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2012-1244",
"datePublished": "2012-04-27T18:00:00",
"dateReserved": "2012-02-21T00:00:00",
"dateUpdated": "2024-08-06T18:53:36.364Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-1978 (GCVE-0-2014-1978)
Vulnerability from nvd – Published: 2014-03-19 14:00 – Updated: 2024-08-06 09:58
VLAI?
Summary
The application link interface in the NTT DOCOMO sp mode mail application 6100 through 6300 for Android 4.0.x and 6130 through 6700 for Android 4.1 through 4.4 writes message content to the SD card during e-mail composition, which allows attackers to obtain sensitive information via a crafted application.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:58:15.773Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVN#05951929",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN05951929/index.html"
},
{
"name": "JVNDB-2014-000028",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000028"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-03-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The application link interface in the NTT DOCOMO sp mode mail application 6100 through 6300 for Android 4.0.x and 6130 through 6700 for Android 4.1 through 4.4 writes message content to the SD card during e-mail composition, which allows attackers to obtain sensitive information via a crafted application."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-03-19T14:57:01",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVN#05951929",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN05951929/index.html"
},
{
"name": "JVNDB-2014-000028",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000028"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-1978",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The application link interface in the NTT DOCOMO sp mode mail application 6100 through 6300 for Android 4.0.x and 6130 through 6700 for Android 4.1 through 4.4 writes message content to the SD card during e-mail composition, which allows attackers to obtain sensitive information via a crafted application."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVN#05951929",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN05951929/index.html"
},
{
"name": "JVNDB-2014-000028",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000028"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2014-1978",
"datePublished": "2014-03-19T14:00:00",
"dateReserved": "2014-02-17T00:00:00",
"dateUpdated": "2024-08-06T09:58:15.773Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-1979 (GCVE-0-2014-1979)
Vulnerability from nvd – Published: 2014-03-19 14:00 – Updated: 2024-08-06 09:58
VLAI?
Summary
The NTT DOCOMO sp mode mail application 5900 through 6300 for Android 4.0.x and 6000 through 6620 for Android 4.1 through 4.4 allows remote attackers to execute arbitrary Java methods via Deco-mail emoticon POP data in an e-mail message.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:58:15.945Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVN#89260331",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN89260331/index.html"
},
{
"name": "JVNDB-2014-000029",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000029"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-03-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The NTT DOCOMO sp mode mail application 5900 through 6300 for Android 4.0.x and 6000 through 6620 for Android 4.1 through 4.4 allows remote attackers to execute arbitrary Java methods via Deco-mail emoticon POP data in an e-mail message."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-03-19T14:57:01",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVN#89260331",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN89260331/index.html"
},
{
"name": "JVNDB-2014-000029",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000029"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-1979",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The NTT DOCOMO sp mode mail application 5900 through 6300 for Android 4.0.x and 6000 through 6620 for Android 4.1 through 4.4 allows remote attackers to execute arbitrary Java methods via Deco-mail emoticon POP data in an e-mail message."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVN#89260331",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN89260331/index.html"
},
{
"name": "JVNDB-2014-000029",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000029"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2014-1979",
"datePublished": "2014-03-19T14:00:00",
"dateReserved": "2014-02-17T00:00:00",
"dateUpdated": "2024-08-06T09:58:15.945Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-1977 (GCVE-0-2014-1977)
Vulnerability from nvd – Published: 2014-03-19 14:00 – Updated: 2024-08-06 09:58
VLAI?
Summary
The NTT DOCOMO sp mode mail application 6300 and earlier for Android 4.0.x and 6700 and earlier for Android 4.1 through 4.4 uses weak permissions for attachments during processing of incoming e-mail messages, which allows attackers to obtain sensitive information via a crafted application.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:58:16.048Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "JVNDB-2014-000027",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000027"
},
{
"name": "JVN#81739241",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN81739241/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-03-18T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The NTT DOCOMO sp mode mail application 6300 and earlier for Android 4.0.x and 6700 and earlier for Android 4.1 through 4.4 uses weak permissions for attachments during processing of incoming e-mail messages, which allows attackers to obtain sensitive information via a crafted application."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-03-19T14:57:01",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "JVNDB-2014-000027",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000027"
},
{
"name": "JVN#81739241",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN81739241/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2014-1977",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The NTT DOCOMO sp mode mail application 6300 and earlier for Android 4.0.x and 6700 and earlier for Android 4.1 through 4.4 uses weak permissions for attachments during processing of incoming e-mail messages, which allows attackers to obtain sensitive information via a crafted application."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "JVNDB-2014-000027",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000027"
},
{
"name": "JVN#81739241",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN81739241/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2014-1977",
"datePublished": "2014-03-19T14:00:00",
"dateReserved": "2014-02-17T00:00:00",
"dateUpdated": "2024-08-06T09:58:16.048Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2012-1244 (GCVE-0-2012-1244)
Vulnerability from nvd – Published: 2012-04-27 18:00 – Updated: 2024-08-06 18:53
VLAI?
Summary
The NTT DOCOMO sp mode mail application 5400 and earlier for Android does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T18:53:36.364Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "spmode-android-ssl-spoofing(75159)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75159"
},
{
"name": "53254",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/53254"
},
{
"name": "JVN#82029095",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN82029095/index.html"
},
{
"name": "48955",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/48955"
},
{
"name": "81629",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/81629"
},
{
"name": "JVNDB-2012-000037",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000037"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2012-04-26T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The NTT DOCOMO sp mode mail application 5400 and earlier for Android does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-12-13T18:57:01",
"orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"shortName": "jpcert"
},
"references": [
{
"name": "spmode-android-ssl-spoofing(75159)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75159"
},
{
"name": "53254",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/53254"
},
{
"name": "JVN#82029095",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN82029095/index.html"
},
{
"name": "48955",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/48955"
},
{
"name": "81629",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/81629"
},
{
"name": "JVNDB-2012-000037",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000037"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vultures@jpcert.or.jp",
"ID": "CVE-2012-1244",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The NTT DOCOMO sp mode mail application 5400 and earlier for Android does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "spmode-android-ssl-spoofing(75159)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75159"
},
{
"name": "53254",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/53254"
},
{
"name": "JVN#82029095",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN82029095/index.html"
},
{
"name": "48955",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/48955"
},
{
"name": "81629",
"refsource": "OSVDB",
"url": "http://osvdb.org/81629"
},
{
"name": "JVNDB-2012-000037",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000037"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
"assignerShortName": "jpcert",
"cveId": "CVE-2012-1244",
"datePublished": "2012-04-27T18:00:00",
"dateReserved": "2012-02-21T00:00:00",
"dateUpdated": "2024-08-06T18:53:36.364Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}