Search criteria

12 vulnerabilities found for spmode_mail_android by nttdocomo

FKIE_CVE-2014-1977

Vulnerability from fkie_nvd - Published: 2014-03-19 14:17 - Updated: 2025-04-12 10:46
Severity ?
Summary
The NTT DOCOMO sp mode mail application 6300 and earlier for Android 4.0.x and 6700 and earlier for Android 4.1 through 4.4 uses weak permissions for attachments during processing of incoming e-mail messages, which allows attackers to obtain sensitive information via a crafted application.
Impacted products
Vendor Product Version
nttdocomo spmode_mail_android *
nttdocomo spmode_mail_android 2546
nttdocomo spmode_mail_android 2631
nttdocomo spmode_mail_android 3000
nttdocomo spmode_mail_android 3100
nttdocomo spmode_mail_android 3200
nttdocomo spmode_mail_android 3300
nttdocomo spmode_mail_android 3400
nttdocomo spmode_mail_android 4000
nttdocomo spmode_mail_android 4200
nttdocomo spmode_mail_android 4300
nttdocomo spmode_mail_android 4400
nttdocomo spmode_mail_android 4500
nttdocomo spmode_mail_android 4600
nttdocomo spmode_mail_android 4700
nttdocomo spmode_mail_android 4800
nttdocomo spmode_mail_android 4900
nttdocomo spmode_mail_android 5000
nttdocomo spmode_mail_android 5100
nttdocomo spmode_mail_android 5200
nttdocomo spmode_mail_android 5300
nttdocomo spmode_mail_android 5400
nttdocomo spmode_mail_android 5500
nttdocomo spmode_mail_android 5550
google android 4.0
google android 4.0.1
google android 4.0.2
google android 4.0.3
google android 4.0.4
nttdocomo spmode_mail_android *
nttdocomo spmode_mail_android 2546
nttdocomo spmode_mail_android 2631
nttdocomo spmode_mail_android 3000
nttdocomo spmode_mail_android 3100
nttdocomo spmode_mail_android 3200
nttdocomo spmode_mail_android 3300
nttdocomo spmode_mail_android 3400
nttdocomo spmode_mail_android 4000
nttdocomo spmode_mail_android 4200
nttdocomo spmode_mail_android 4300
nttdocomo spmode_mail_android 4400
nttdocomo spmode_mail_android 4500
nttdocomo spmode_mail_android 4600
nttdocomo spmode_mail_android 4700
nttdocomo spmode_mail_android 4800
nttdocomo spmode_mail_android 4900
nttdocomo spmode_mail_android 5000
nttdocomo spmode_mail_android 5100
nttdocomo spmode_mail_android 5200
nttdocomo spmode_mail_android 5300
nttdocomo spmode_mail_android 5400
nttdocomo spmode_mail_android 5500
nttdocomo spmode_mail_android 5550
google android 4.1
google android 4.1.2
google android 4.2
google android 4.2.1
google android 4.2.2
google android 4.3
google android 4.3.1
google android 4.4

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:*:*:*:*:*:android:*:*",
              "matchCriteriaId": "54A62BDA-611F-4C30-B31C-3A22EBADC915",
              "versionEndIncluding": "6300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:2546:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D674F3-B9B0-4E04-882A-1A99E8D64BC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:2631:*:*:*:*:*:*:*",
              "matchCriteriaId": "05A86980-2D42-4CDB-95F4-35ED3F1EAE75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:3000:*:*:*:*:*:*:*",
              "matchCriteriaId": "607E5791-C8A5-43FC-9C95-6F1403A1C45A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:3100:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2AC61F7-11EE-4867-9817-3DAA3BC6C1F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:3200:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F3544EA-464C-42F6-AF72-ACB58668284A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:3300:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED607719-C78B-4716-A531-20E292BCB496",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:3400:*:*:*:*:*:*:*",
              "matchCriteriaId": "B640DDD3-50EC-4E8B-87A7-5E49837C663C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4000:*:*:*:*:*:*:*",
              "matchCriteriaId": "34AD600E-05D6-4AEE-9DC8-5DCBD0172262",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4200:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA995ABD-6B2B-4808-9546-9553940A2A08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4300:*:*:*:*:*:*:*",
              "matchCriteriaId": "1593F4B2-3B53-490E-8E15-84FC0514D4AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4400:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE566215-3A8D-4311-99D1-B6E07CE46479",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4500:*:*:*:*:*:*:*",
              "matchCriteriaId": "0256B6C8-E7D2-48A1-B4A8-82437D20B813",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4600:*:*:*:*:*:*:*",
              "matchCriteriaId": "76B81BE2-B462-48BD-8641-0E36639073F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4700:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC452E75-380E-41C8-9081-08DCD806EA28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4800:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC44F338-BF16-402B-AB03-7FABE1457DC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4900:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0E8AC52-F7B1-4FDE-B146-1C4DACD0AB64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5000:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BC15FCC-22F4-4BD5-8F8F-7BA73BB24531",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5100:*:*:*:*:*:*:*",
              "matchCriteriaId": "8967289A-8DEE-4456-A089-B3239D88C3BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5200:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA37E3D6-87C3-4CB2-A16F-18AB9CA9A31C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5300:*:*:*:*:*:*:*",
              "matchCriteriaId": "42AFE304-60F2-413C-8953-A7B16DB52C01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5400:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D9A41DC-F103-4B41-87D2-2BA41B1EBEDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5500:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA76F398-B411-412B-9746-D15E08E73C0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5550:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD1F93A3-B514-4426-9DD1-8D34AB8D4F8A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:*:*:*:*:*:android:*:*",
              "matchCriteriaId": "44C3C6B2-F151-49F9-8AEE-3B7AA0D142D3",
              "versionEndIncluding": "6700",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:2546:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D674F3-B9B0-4E04-882A-1A99E8D64BC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:2631:*:*:*:*:*:*:*",
              "matchCriteriaId": "05A86980-2D42-4CDB-95F4-35ED3F1EAE75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:3000:*:*:*:*:*:*:*",
              "matchCriteriaId": "607E5791-C8A5-43FC-9C95-6F1403A1C45A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:3100:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2AC61F7-11EE-4867-9817-3DAA3BC6C1F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:3200:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F3544EA-464C-42F6-AF72-ACB58668284A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:3300:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED607719-C78B-4716-A531-20E292BCB496",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:3400:*:*:*:*:*:*:*",
              "matchCriteriaId": "B640DDD3-50EC-4E8B-87A7-5E49837C663C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4000:*:*:*:*:*:*:*",
              "matchCriteriaId": "34AD600E-05D6-4AEE-9DC8-5DCBD0172262",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4200:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA995ABD-6B2B-4808-9546-9553940A2A08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4300:*:*:*:*:*:*:*",
              "matchCriteriaId": "1593F4B2-3B53-490E-8E15-84FC0514D4AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4400:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE566215-3A8D-4311-99D1-B6E07CE46479",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4500:*:*:*:*:*:*:*",
              "matchCriteriaId": "0256B6C8-E7D2-48A1-B4A8-82437D20B813",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4600:*:*:*:*:*:*:*",
              "matchCriteriaId": "76B81BE2-B462-48BD-8641-0E36639073F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4700:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC452E75-380E-41C8-9081-08DCD806EA28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4800:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC44F338-BF16-402B-AB03-7FABE1457DC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4900:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0E8AC52-F7B1-4FDE-B146-1C4DACD0AB64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5000:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BC15FCC-22F4-4BD5-8F8F-7BA73BB24531",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5100:*:*:*:*:*:*:*",
              "matchCriteriaId": "8967289A-8DEE-4456-A089-B3239D88C3BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5200:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA37E3D6-87C3-4CB2-A16F-18AB9CA9A31C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5300:*:*:*:*:*:*:*",
              "matchCriteriaId": "42AFE304-60F2-413C-8953-A7B16DB52C01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5400:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D9A41DC-F103-4B41-87D2-2BA41B1EBEDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5500:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA76F398-B411-412B-9746-D15E08E73C0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5550:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD1F93A3-B514-4426-9DD1-8D34AB8D4F8A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CD857E7-B878-49F9-BDDA-93DDEBB0B42B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBDABB6C-FFF9-4E79-9EF1-BDC0BBDEA9F1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A47AB858-36DE-4330-8CAC-1B46C5C8DA80",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "49413FF7-7910-4F74-B106-C3170612CB2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2467F65-A3B7-4E45-A9A5-E5A6EFD99D7B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8882E50-7C49-4A99-91F2-DF979CF8BB2F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "98C32982-095C-4628-9958-118A3D3A9CAA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The NTT DOCOMO sp mode mail application 6300 and earlier for Android 4.0.x and 6700 and earlier for Android 4.1 through 4.4 uses weak permissions for attachments during processing of incoming e-mail messages, which allows attackers to obtain sensitive information via a crafted application."
    },
    {
      "lang": "es",
      "value": "La aplicaci\u00f3n de correo NTT DOCOMO sp mode 6300  y anteriores para Android 4.0.x y 6700 y anteriores para Android 4.1 hasta 4.4 utiliza permisos d\u00e9biles para adjuntos durante el procesamiento de mensajes email entrantes, lo que permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de una aplicaci\u00f3n manipulada."
    }
  ],
  "id": "CVE-2014-1977",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-03-19T14:17:45.070",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvn.jp/en/jp/JVN81739241/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000027"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN81739241/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000027"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2014-1978

Vulnerability from fkie_nvd - Published: 2014-03-19 14:17 - Updated: 2025-04-12 10:46
Severity ?
Summary
The application link interface in the NTT DOCOMO sp mode mail application 6100 through 6300 for Android 4.0.x and 6130 through 6700 for Android 4.1 through 4.4 writes message content to the SD card during e-mail composition, which allows attackers to obtain sensitive information via a crafted application.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:6100:*:*:*:*:android:*:*",
              "matchCriteriaId": "4B2B7E7F-9D73-42B8-BC76-33D7243024F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:6300:*:*:*:*:android:*:*",
              "matchCriteriaId": "D24242AD-2016-488F-9FC9-76210F05B861",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:6130:*:*:*:*:android:*:*",
              "matchCriteriaId": "266A416B-CD5B-4621-A311-6E42EC2FB88F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:6700:*:*:*:*:android:*:*",
              "matchCriteriaId": "9F62E0A1-3F6D-41A1-B0F8-E57026A67B26",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CD857E7-B878-49F9-BDDA-93DDEBB0B42B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBDABB6C-FFF9-4E79-9EF1-BDC0BBDEA9F1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A47AB858-36DE-4330-8CAC-1B46C5C8DA80",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "49413FF7-7910-4F74-B106-C3170612CB2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2467F65-A3B7-4E45-A9A5-E5A6EFD99D7B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8882E50-7C49-4A99-91F2-DF979CF8BB2F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "98C32982-095C-4628-9958-118A3D3A9CAA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The application link interface in the NTT DOCOMO sp mode mail application 6100 through 6300 for Android 4.0.x and 6130 through 6700 for Android 4.1 through 4.4 writes message content to the SD card during e-mail composition, which allows attackers to obtain sensitive information via a crafted application."
    },
    {
      "lang": "es",
      "value": "La interfaz de enlace de aplicaci\u00f3n en la aplicaci\u00f3n de correo NTT DOCOMO sp mode 6100 hasta 6300 para Android 4.0.x y 6130 hasta 6700 para Android 4.1 hasta 4.4 escribe contenido de mensajes en la tarjeta SD durante la composici\u00f3n de email, lo que permite a atacantes obtener informaci\u00f3n sensible a trav\u00e9s de una aplicaci\u00f3n manipulada."
    }
  ],
  "id": "CVE-2014-1978",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-03-19T14:17:45.103",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvn.jp/en/jp/JVN05951929/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000028"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN05951929/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000028"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2014-1979

Vulnerability from fkie_nvd - Published: 2014-03-19 14:17 - Updated: 2025-04-12 10:46
Severity ?
Summary
The NTT DOCOMO sp mode mail application 5900 through 6300 for Android 4.0.x and 6000 through 6620 for Android 4.1 through 4.4 allows remote attackers to execute arbitrary Java methods via Deco-mail emoticon POP data in an e-mail message.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:6000:*:*:*:*:android:*:*",
              "matchCriteriaId": "B4D56149-DCF9-414E-A718-9DC5C2FB1106",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:6200:*:*:*:*:android:*:*",
              "matchCriteriaId": "7FF44DAF-E177-4910-85D1-5A9FEDF18318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:6620:*:*:*:*:android:*:*",
              "matchCriteriaId": "42DCA324-A8D5-427E-A8AC-593AE8129FA7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DA9F0F7-D592-481E-884C-B1A94E702825",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CD857E7-B878-49F9-BDDA-93DDEBB0B42B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBDABB6C-FFF9-4E79-9EF1-BDC0BBDEA9F1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A47AB858-36DE-4330-8CAC-1B46C5C8DA80",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "49413FF7-7910-4F74-B106-C3170612CB2A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2467F65-A3B7-4E45-A9A5-E5A6EFD99D7B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8882E50-7C49-4A99-91F2-DF979CF8BB2F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "98C32982-095C-4628-9958-118A3D3A9CAA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5900:*:*:*:*:android:*:*",
              "matchCriteriaId": "A2C5ABA5-5F23-42C5-9B09-C8559DC417C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:6000:*:*:*:*:android:*:*",
              "matchCriteriaId": "B4D56149-DCF9-414E-A718-9DC5C2FB1106",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:6200:*:*:*:*:android:*:*",
              "matchCriteriaId": "7FF44DAF-E177-4910-85D1-5A9FEDF18318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:6300:*:*:*:*:android:*:*",
              "matchCriteriaId": "D24242AD-2016-488F-9FC9-76210F05B861",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A39C31E3-75C0-4E92-A6B5-7D67B22E3449",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB318EA4-2908-4B91-8DBB-20008FDF528A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F4E46A9-B652-47CE-92E8-01021E57724B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "36DD8E3F-6308-4680-B932-4CBD8E58A7FB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The NTT DOCOMO sp mode mail application 5900 through 6300 for Android 4.0.x and 6000 through 6620 for Android 4.1 through 4.4 allows remote attackers to execute arbitrary Java methods via Deco-mail emoticon POP data in an e-mail message."
    },
    {
      "lang": "es",
      "value": "La aplicaci\u00f3n de correo NTT DOCOMO sp mode 5900 hasta 6300 para Android 4.0.x y 6000 hasta 6620 para Android 4.1 hasta 4.4 permite a atacantes remotos ejecutar m\u00e9todos Java arbitrarios a trav\u00e9s de datos POP Deco-mail emoticon en un mensaje de email."
    }
  ],
  "id": "CVE-2014-1979",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2014-03-19T14:17:45.117",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvn.jp/en/jp/JVN89260331/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000029"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN89260331/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000029"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2012-1244

Vulnerability from fkie_nvd - Published: 2012-04-27 18:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
The NTT DOCOMO sp mode mail application 5400 and earlier for Android does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B151C86-2D0E-49C0-8C04-1FA667BBB2DE",
              "versionEndIncluding": "5400",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:2546:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D674F3-B9B0-4E04-882A-1A99E8D64BC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:2631:*:*:*:*:*:*:*",
              "matchCriteriaId": "05A86980-2D42-4CDB-95F4-35ED3F1EAE75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:3000:*:*:*:*:*:*:*",
              "matchCriteriaId": "607E5791-C8A5-43FC-9C95-6F1403A1C45A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:3100:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2AC61F7-11EE-4867-9817-3DAA3BC6C1F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:3200:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F3544EA-464C-42F6-AF72-ACB58668284A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:3300:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED607719-C78B-4716-A531-20E292BCB496",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:3400:*:*:*:*:*:*:*",
              "matchCriteriaId": "B640DDD3-50EC-4E8B-87A7-5E49837C663C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4000:*:*:*:*:*:*:*",
              "matchCriteriaId": "34AD600E-05D6-4AEE-9DC8-5DCBD0172262",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4200:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA995ABD-6B2B-4808-9546-9553940A2A08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4300:*:*:*:*:*:*:*",
              "matchCriteriaId": "1593F4B2-3B53-490E-8E15-84FC0514D4AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4400:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE566215-3A8D-4311-99D1-B6E07CE46479",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4500:*:*:*:*:*:*:*",
              "matchCriteriaId": "0256B6C8-E7D2-48A1-B4A8-82437D20B813",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4600:*:*:*:*:*:*:*",
              "matchCriteriaId": "76B81BE2-B462-48BD-8641-0E36639073F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4700:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC452E75-380E-41C8-9081-08DCD806EA28",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4800:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC44F338-BF16-402B-AB03-7FABE1457DC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:4900:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0E8AC52-F7B1-4FDE-B146-1C4DACD0AB64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5000:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BC15FCC-22F4-4BD5-8F8F-7BA73BB24531",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5100:*:*:*:*:*:*:*",
              "matchCriteriaId": "8967289A-8DEE-4456-A089-B3239D88C3BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5200:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA37E3D6-87C3-4CB2-A16F-18AB9CA9A31C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nttdocomo:spmode_mail_android:5300:*:*:*:*:*:*:*",
              "matchCriteriaId": "42AFE304-60F2-413C-8953-A7B16DB52C01",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The NTT DOCOMO sp mode mail application 5400 and earlier for Android does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate."
    },
    {
      "lang": "es",
      "value": "La aplicaci\u00f3n de correo para Android NTT DoCoMo sp mode v5400 y anteriores no verifica correctamente los certificados X.509 de servidores SSL, lo que permite falsificar servidores a atacantes man-in-the-middle y obtener informaci\u00f3n sensible a trav\u00e9s de un certificado hecho a mano."
    }
  ],
  "id": "CVE-2012-1244",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-04-27T18:55:01.047",
  "references": [
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvn.jp/en/jp/JVN82029095/index.html"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000037"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://osvdb.org/81629"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://secunia.com/advisories/48955"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "http://www.securityfocus.com/bid/53254"
    },
    {
      "source": "vultures@jpcert.or.jp",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75159"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvn.jp/en/jp/JVN82029095/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000037"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/81629"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48955"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/53254"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75159"
    }
  ],
  "sourceIdentifier": "vultures@jpcert.or.jp",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2014-1978 (GCVE-0-2014-1978)

Vulnerability from cvelistv5 – Published: 2014-03-19 14:00 – Updated: 2024-08-06 09:58
VLAI?
Summary
The application link interface in the NTT DOCOMO sp mode mail application 6100 through 6300 for Android 4.0.x and 6130 through 6700 for Android 4.1 through 4.4 writes message content to the SD card during e-mail composition, which allows attackers to obtain sensitive information via a crafted application.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvn.jp/en/jp/JVN05951929/index.html third-party-advisoryx_refsource_JVN
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000028 third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:58:15.773Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#05951929",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN05951929/index.html"
          },
          {
            "name": "JVNDB-2014-000028",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000028"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-03-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The application link interface in the NTT DOCOMO sp mode mail application 6100 through 6300 for Android 4.0.x and 6130 through 6700 for Android 4.1 through 4.4 writes message content to the SD card during e-mail composition, which allows attackers to obtain sensitive information via a crafted application."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-03-19T14:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVN#05951929",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN05951929/index.html"
        },
        {
          "name": "JVNDB-2014-000028",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000028"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2014-1978",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The application link interface in the NTT DOCOMO sp mode mail application 6100 through 6300 for Android 4.0.x and 6130 through 6700 for Android 4.1 through 4.4 writes message content to the SD card during e-mail composition, which allows attackers to obtain sensitive information via a crafted application."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#05951929",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN05951929/index.html"
            },
            {
              "name": "JVNDB-2014-000028",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000028"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2014-1978",
    "datePublished": "2014-03-19T14:00:00",
    "dateReserved": "2014-02-17T00:00:00",
    "dateUpdated": "2024-08-06T09:58:15.773Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-1979 (GCVE-0-2014-1979)

Vulnerability from cvelistv5 – Published: 2014-03-19 14:00 – Updated: 2024-08-06 09:58
VLAI?
Summary
The NTT DOCOMO sp mode mail application 5900 through 6300 for Android 4.0.x and 6000 through 6620 for Android 4.1 through 4.4 allows remote attackers to execute arbitrary Java methods via Deco-mail emoticon POP data in an e-mail message.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvn.jp/en/jp/JVN89260331/index.html third-party-advisoryx_refsource_JVN
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000029 third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:58:15.945Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#89260331",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN89260331/index.html"
          },
          {
            "name": "JVNDB-2014-000029",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000029"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-03-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The NTT DOCOMO sp mode mail application 5900 through 6300 for Android 4.0.x and 6000 through 6620 for Android 4.1 through 4.4 allows remote attackers to execute arbitrary Java methods via Deco-mail emoticon POP data in an e-mail message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-03-19T14:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVN#89260331",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN89260331/index.html"
        },
        {
          "name": "JVNDB-2014-000029",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000029"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2014-1979",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The NTT DOCOMO sp mode mail application 5900 through 6300 for Android 4.0.x and 6000 through 6620 for Android 4.1 through 4.4 allows remote attackers to execute arbitrary Java methods via Deco-mail emoticon POP data in an e-mail message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#89260331",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN89260331/index.html"
            },
            {
              "name": "JVNDB-2014-000029",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000029"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2014-1979",
    "datePublished": "2014-03-19T14:00:00",
    "dateReserved": "2014-02-17T00:00:00",
    "dateUpdated": "2024-08-06T09:58:15.945Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-1977 (GCVE-0-2014-1977)

Vulnerability from cvelistv5 – Published: 2014-03-19 14:00 – Updated: 2024-08-06 09:58
VLAI?
Summary
The NTT DOCOMO sp mode mail application 6300 and earlier for Android 4.0.x and 6700 and earlier for Android 4.1 through 4.4 uses weak permissions for attachments during processing of incoming e-mail messages, which allows attackers to obtain sensitive information via a crafted application.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000027 third-party-advisoryx_refsource_JVNDB
http://jvn.jp/en/jp/JVN81739241/index.html third-party-advisoryx_refsource_JVN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:58:16.048Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVNDB-2014-000027",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000027"
          },
          {
            "name": "JVN#81739241",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN81739241/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-03-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The NTT DOCOMO sp mode mail application 6300 and earlier for Android 4.0.x and 6700 and earlier for Android 4.1 through 4.4 uses weak permissions for attachments during processing of incoming e-mail messages, which allows attackers to obtain sensitive information via a crafted application."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-03-19T14:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVNDB-2014-000027",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000027"
        },
        {
          "name": "JVN#81739241",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN81739241/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2014-1977",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The NTT DOCOMO sp mode mail application 6300 and earlier for Android 4.0.x and 6700 and earlier for Android 4.1 through 4.4 uses weak permissions for attachments during processing of incoming e-mail messages, which allows attackers to obtain sensitive information via a crafted application."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVNDB-2014-000027",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000027"
            },
            {
              "name": "JVN#81739241",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN81739241/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2014-1977",
    "datePublished": "2014-03-19T14:00:00",
    "dateReserved": "2014-02-17T00:00:00",
    "dateUpdated": "2024-08-06T09:58:16.048Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-1244 (GCVE-0-2012-1244)

Vulnerability from cvelistv5 – Published: 2012-04-27 18:00 – Updated: 2024-08-06 18:53
VLAI?
Summary
The NTT DOCOMO sp mode mail application 5400 and earlier for Android does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/bid/53254 vdb-entryx_refsource_BID
http://jvn.jp/en/jp/JVN82029095/index.html third-party-advisoryx_refsource_JVN
http://secunia.com/advisories/48955 third-party-advisoryx_refsource_SECUNIA
http://osvdb.org/81629 vdb-entryx_refsource_OSVDB
http://jvndb.jvn.jp/jvndb/JVNDB-2012-000037 third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:53:36.364Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "spmode-android-ssl-spoofing(75159)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75159"
          },
          {
            "name": "53254",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/53254"
          },
          {
            "name": "JVN#82029095",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN82029095/index.html"
          },
          {
            "name": "48955",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48955"
          },
          {
            "name": "81629",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/81629"
          },
          {
            "name": "JVNDB-2012-000037",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000037"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-04-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The NTT DOCOMO sp mode mail application 5400 and earlier for Android does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-13T18:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "spmode-android-ssl-spoofing(75159)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75159"
        },
        {
          "name": "53254",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/53254"
        },
        {
          "name": "JVN#82029095",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN82029095/index.html"
        },
        {
          "name": "48955",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48955"
        },
        {
          "name": "81629",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/81629"
        },
        {
          "name": "JVNDB-2012-000037",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000037"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2012-1244",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The NTT DOCOMO sp mode mail application 5400 and earlier for Android does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "spmode-android-ssl-spoofing(75159)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75159"
            },
            {
              "name": "53254",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/53254"
            },
            {
              "name": "JVN#82029095",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN82029095/index.html"
            },
            {
              "name": "48955",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48955"
            },
            {
              "name": "81629",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/81629"
            },
            {
              "name": "JVNDB-2012-000037",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000037"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2012-1244",
    "datePublished": "2012-04-27T18:00:00",
    "dateReserved": "2012-02-21T00:00:00",
    "dateUpdated": "2024-08-06T18:53:36.364Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-1978 (GCVE-0-2014-1978)

Vulnerability from nvd – Published: 2014-03-19 14:00 – Updated: 2024-08-06 09:58
VLAI?
Summary
The application link interface in the NTT DOCOMO sp mode mail application 6100 through 6300 for Android 4.0.x and 6130 through 6700 for Android 4.1 through 4.4 writes message content to the SD card during e-mail composition, which allows attackers to obtain sensitive information via a crafted application.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvn.jp/en/jp/JVN05951929/index.html third-party-advisoryx_refsource_JVN
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000028 third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:58:15.773Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#05951929",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN05951929/index.html"
          },
          {
            "name": "JVNDB-2014-000028",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000028"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-03-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The application link interface in the NTT DOCOMO sp mode mail application 6100 through 6300 for Android 4.0.x and 6130 through 6700 for Android 4.1 through 4.4 writes message content to the SD card during e-mail composition, which allows attackers to obtain sensitive information via a crafted application."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-03-19T14:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVN#05951929",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN05951929/index.html"
        },
        {
          "name": "JVNDB-2014-000028",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000028"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2014-1978",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The application link interface in the NTT DOCOMO sp mode mail application 6100 through 6300 for Android 4.0.x and 6130 through 6700 for Android 4.1 through 4.4 writes message content to the SD card during e-mail composition, which allows attackers to obtain sensitive information via a crafted application."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#05951929",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN05951929/index.html"
            },
            {
              "name": "JVNDB-2014-000028",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000028"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2014-1978",
    "datePublished": "2014-03-19T14:00:00",
    "dateReserved": "2014-02-17T00:00:00",
    "dateUpdated": "2024-08-06T09:58:15.773Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-1979 (GCVE-0-2014-1979)

Vulnerability from nvd – Published: 2014-03-19 14:00 – Updated: 2024-08-06 09:58
VLAI?
Summary
The NTT DOCOMO sp mode mail application 5900 through 6300 for Android 4.0.x and 6000 through 6620 for Android 4.1 through 4.4 allows remote attackers to execute arbitrary Java methods via Deco-mail emoticon POP data in an e-mail message.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvn.jp/en/jp/JVN89260331/index.html third-party-advisoryx_refsource_JVN
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000029 third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:58:15.945Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVN#89260331",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN89260331/index.html"
          },
          {
            "name": "JVNDB-2014-000029",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000029"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-03-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The NTT DOCOMO sp mode mail application 5900 through 6300 for Android 4.0.x and 6000 through 6620 for Android 4.1 through 4.4 allows remote attackers to execute arbitrary Java methods via Deco-mail emoticon POP data in an e-mail message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-03-19T14:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVN#89260331",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN89260331/index.html"
        },
        {
          "name": "JVNDB-2014-000029",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000029"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2014-1979",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The NTT DOCOMO sp mode mail application 5900 through 6300 for Android 4.0.x and 6000 through 6620 for Android 4.1 through 4.4 allows remote attackers to execute arbitrary Java methods via Deco-mail emoticon POP data in an e-mail message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVN#89260331",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN89260331/index.html"
            },
            {
              "name": "JVNDB-2014-000029",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000029"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2014-1979",
    "datePublished": "2014-03-19T14:00:00",
    "dateReserved": "2014-02-17T00:00:00",
    "dateUpdated": "2024-08-06T09:58:15.945Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-1977 (GCVE-0-2014-1977)

Vulnerability from nvd – Published: 2014-03-19 14:00 – Updated: 2024-08-06 09:58
VLAI?
Summary
The NTT DOCOMO sp mode mail application 6300 and earlier for Android 4.0.x and 6700 and earlier for Android 4.1 through 4.4 uses weak permissions for attachments during processing of incoming e-mail messages, which allows attackers to obtain sensitive information via a crafted application.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000027 third-party-advisoryx_refsource_JVNDB
http://jvn.jp/en/jp/JVN81739241/index.html third-party-advisoryx_refsource_JVN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:58:16.048Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVNDB-2014-000027",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000027"
          },
          {
            "name": "JVN#81739241",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN81739241/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-03-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The NTT DOCOMO sp mode mail application 6300 and earlier for Android 4.0.x and 6700 and earlier for Android 4.1 through 4.4 uses weak permissions for attachments during processing of incoming e-mail messages, which allows attackers to obtain sensitive information via a crafted application."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-03-19T14:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "JVNDB-2014-000027",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000027"
        },
        {
          "name": "JVN#81739241",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN81739241/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2014-1977",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The NTT DOCOMO sp mode mail application 6300 and earlier for Android 4.0.x and 6700 and earlier for Android 4.1 through 4.4 uses weak permissions for attachments during processing of incoming e-mail messages, which allows attackers to obtain sensitive information via a crafted application."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVNDB-2014-000027",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000027"
            },
            {
              "name": "JVN#81739241",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN81739241/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2014-1977",
    "datePublished": "2014-03-19T14:00:00",
    "dateReserved": "2014-02-17T00:00:00",
    "dateUpdated": "2024-08-06T09:58:16.048Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-1244 (GCVE-0-2012-1244)

Vulnerability from nvd – Published: 2012-04-27 18:00 – Updated: 2024-08-06 18:53
VLAI?
Summary
The NTT DOCOMO sp mode mail application 5400 and earlier for Android does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.securityfocus.com/bid/53254 vdb-entryx_refsource_BID
http://jvn.jp/en/jp/JVN82029095/index.html third-party-advisoryx_refsource_JVN
http://secunia.com/advisories/48955 third-party-advisoryx_refsource_SECUNIA
http://osvdb.org/81629 vdb-entryx_refsource_OSVDB
http://jvndb.jvn.jp/jvndb/JVNDB-2012-000037 third-party-advisoryx_refsource_JVNDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:53:36.364Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "spmode-android-ssl-spoofing(75159)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75159"
          },
          {
            "name": "53254",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/53254"
          },
          {
            "name": "JVN#82029095",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN82029095/index.html"
          },
          {
            "name": "48955",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/48955"
          },
          {
            "name": "81629",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/81629"
          },
          {
            "name": "JVNDB-2012-000037",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000037"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-04-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The NTT DOCOMO sp mode mail application 5400 and earlier for Android does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-13T18:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "name": "spmode-android-ssl-spoofing(75159)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75159"
        },
        {
          "name": "53254",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/53254"
        },
        {
          "name": "JVN#82029095",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN82029095/index.html"
        },
        {
          "name": "48955",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/48955"
        },
        {
          "name": "81629",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/81629"
        },
        {
          "name": "JVNDB-2012-000037",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000037"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2012-1244",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The NTT DOCOMO sp mode mail application 5400 and earlier for Android does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "spmode-android-ssl-spoofing(75159)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75159"
            },
            {
              "name": "53254",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/53254"
            },
            {
              "name": "JVN#82029095",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN82029095/index.html"
            },
            {
              "name": "48955",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/48955"
            },
            {
              "name": "81629",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/81629"
            },
            {
              "name": "JVNDB-2012-000037",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000037"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2012-1244",
    "datePublished": "2012-04-27T18:00:00",
    "dateReserved": "2012-02-21T00:00:00",
    "dateUpdated": "2024-08-06T18:53:36.364Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}