lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAHmS9PJE-fH9ySLwv-B+JoDMC8Sgex9hJ2zWXHAxxEnGmZ+U=w@mail.gmail.com>
Date: Fri, 31 Mar 2017 17:36:43 -0400
From: David Coomber <davidcoomber.infosec@...il.com>
To: fulldisclosure@...lists.org, bugtraq@...urityfocus.com
Subject: [FD] Trend Micro Enterprise Mobile Security Android Application -
 MITM SSL Certificate Vulnerability (CVE-2016-9319)

Trend Micro Enterprise Mobile Security Android Application - MITM SSL
Certificate Vulnerability (CVE-2016-9319)
--
http://www.info-sec.ca/advisories/Trend-Micro-Enterprise-Mobile-Security.html

Overview

"Trend Micro Mobile Security is the client app for Trend Micro’s
enterprise mobility platform. Trend Micro Mobile Security for
enterprises lets IT administrators enroll, manage and secure employee
mobile devices. With built in Mobile device management, app
management, app reputation and device AV, Mobile Security is a
powerful tool for enterprises that want to enable their mobile
employees securely."

(https://play.google.com/store/apps/details?id=com.trendmicro.tmmssuite.mdm)

Issue

The Trend Micro Enterprise Mobile Security Android application
(version 9.7.1182 and below), does not validate the SSL certificate it
receives when connecting to the mobile application login server.

Impact

An attacker who can perform a man in the middle attack may present a
bogus SSL certificate which the application will accept silently.
Sensitive information could be captured by an attacker without the
user's knowledge.

Timeline

October 23, 2016 - Notified Trend Micro via security@...ndmicro.com
October 23, 2016 - Trend Micro responded that they will investigate
October 24, 2016 - Trend Micro asked for steps to reproduce the vulnerability
October 25, 2016 - Provided steps to reproduce
November 7, 2016 - Trend Micro confirmed the vulnerability
January 25, 2017 - Trend Micro stated that they expect the
vulnerability to be resolved in the next version
February 15, 2017 - Trend Micro released version 9.7.1193 which
resolves this vulnerability
March 29, 2017 - Trend Micro completed the localization and deployment
of version 9.7.1193 to all regions

Solution

Upgrade to version 9.7.1193 or later

https://success.trendmicro.com/solution/1116973

CVE-ID:

CVE-2016-9319

_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ