ID

VAR-201011-0089


CVE

CVE-2010-4211


TITLE

PayPal app In Paypal Web Vulnerability impersonating a server

Trust: 0.8

sources: JVNDB: JVNDB-2010-003380

DESCRIPTION

The PayPal app before 3.0.1 for iOS does not verify that the server hostname matches the domain name of the subject of an X.509 certificate, which allows man-in-the-middle attackers to spoof a PayPal web server via an arbitrary certificate. eBay PayPal is prone to a security-bypass vulnerability because it fails to properly verify x.509 certificates. Successfully exploiting this issue allows attackers to perform man-in-the-middle attacks or impersonate trusted servers which will aid in further attacks. NOTE: This issue affects connections on unsecured Wi-Fi networks. Versions prior to PayPal 3.0.1 for iOS-based mobile devices are vulnerable. ---------------------------------------------------------------------- Secunia is pleased to announce the release of the annual Secunia report for 2008. Highlights from the 2008 report: * Vulnerability Research * Software Inspection Results * Secunia Research Highlights * Secunia Advisory Statistics Request the full 2008 Report here: http://secunia.com/advisories/try_vi/request_2008_report/ Stay Secure, Secunia ---------------------------------------------------------------------- TITLE: McAfee Products Archive Handling Security Bypass SECUNIA ADVISORY ID: SA34949 VERIFY ADVISORY: http://secunia.com/advisories/34949/ DESCRIPTION: Some weaknesses have been reported in various McAfee products, which can be exploited by malware to bypass the scanning functionality. The weaknesses are caused due to errors in the handling of archive file formats (e.g. SOLUTION: Update .DAT files to DAT 5600 or later. http://www.mcafee.com/apps/downloads/security_updates/dat.asp PROVIDED AND/OR DISCOVERED BY: * Thierry Zoller * The vendor also credits Mickael Roger. ORIGINAL ADVISORY: McAfee: https://kc.mcafee.com/corporate/index?page=content&id=SB10001&actp=LIST_RECENT Thierry Zoller: http://blog.zoller.lu/2009/04/mcafee-multiple-bypassesevasions-ziprar.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . ________________________________________________________________________ From the low-hanging-fruit-department - Mcafee multiple generic evasions ________________________________________________________________________ Release mode: Coordinated but limited disclosure. Ref : TZO-182009 - Mcafee multiple generic evasions WWW : http://blog.zoller.lu/2009/04/mcafee-multiple-bypassesevasions-ziprar.html Vendor : http://www.mcafee.com Status : Patched CVE : CVE-2009-1348 (provided by mcafee) https://kc.mcafee.com/corporate/index?page=content&id=SB10001&actp=LIST_RECENT Security notification reaction rating : very good Notification to patch window : +-27 days (Eastern holidays in between) Disclosure Policy : http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html Affected products : - McAfee VirusScan\xae Plus 2009 - McAfee Total Protection\x99 2009 - McAfee Internet Security - McAfee VirusScan USB - McAfee VirusScan Enterprise - McAfee VirusScan Enterprise Linux - McAfee VirusScan Enterprise for SAP - McAfee VirusScan Enterprise for Storage - McAfee VirusScan Commandline - Mcafee SecurityShield for Microsoft ISA Server - Mcafee Security for Microsoft Sharepoint - Mcafee Security for Email Servers - McAfee Email Gateyway - McAfee Total Protection for Endpoint - McAfee Active Virus Defense - McAfee Active VirusScan It is unkown whether SaaS were affected (tough likely) : - McAfee Email Security Service - McAfee Total Protection Service Advanced I. Background ~~~~~~~~~~~~~ Quote: "McAfee proactively secures systems and networks from known and as yet undiscovered threats worldwide. Home users, businesses, service providers, government agencies, and our partners all trust our unmatched security expertise and have confidence in our comprehensive and proven solutions to effectively block attacks and prevent disruptions." II. Description ~~~~~~~~~~~~~~~ The parsing engine can be bypassed by a specially crafted and formated RAR (Headflags and Packsize),ZIP (Filelenght) archive. III. Impact ~~~~~~~~~~~ A general description of the impact and nature of AV Bypasses/evasions can be read at : http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html The bug results in denying the engine the possibility to inspect code within RAR and ZIP archives. There is no inspection of the content at all and hence the impossibility to detect malicious code. IV. Disclosure timeline ~~~~~~~~~~~~~~~~~~~~~~~~~ DD/MM/YYYY 04/04/2009 : Send proof of concept RAR I, description the terms under which I cooperate and the planned disclosure date 06/04/2009 : Send proof of concept RAR II, description the terms under which I cooperate and the planned disclosure date 06/04/2009 : Mcafee acknowledges receipt and reproduction of RAR I, ack acknowledges receipt of RARII 10/04/2009 : Send proof of concept ZIP I, description the terms under which I cooperate and the planned disclosure date 21/04/2009 : Mcafee provides CVE number CVE-2009-1348 28/04/2009 : Mcafee informs me that the patch might be released on the 29th 29/04/2009 : Mcafee confirms patch release and provides URL https://kc.mcafee.com/corporate/index?page=content&id=SB10001&actp=LIST_RECENT 29/04/2009 : Ask for affected versions 29/04/2009 : Mcafee replies " This issue does affect all vs engine products, including both gateway and endpoint" _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/

Trust: 2.16

sources: NVD: CVE-2010-4211 // JVNDB: JVNDB-2010-003380 // BID: 44657 // VULHUB: VHN-46816 // PACKETSTORM: 77183 // PACKETSTORM: 77170

AFFECTED PRODUCTS

vendor:ebaymodel:paypalscope:lteversion:3.0

Trust: 1.0

vendor:ebaymodel:paypalscope:ltversion:ios edition 3.0.1

Trust: 0.8

vendor:ebaymodel:paypalscope:eqversion:3.0

Trust: 0.6

sources: JVNDB: JVNDB-2010-003380 // CNNVD: CNNVD-201011-094 // NVD: CVE-2010-4211

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2010-4211
value: LOW

Trust: 1.0

NVD: CVE-2010-4211
value: LOW

Trust: 0.8

CNNVD: CNNVD-201011-094
value: LOW

Trust: 0.6

VULHUB: VHN-46816
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2010-4211
severity: LOW
baseScore: 2.9
vectorString: AV:A/AC:M/AU:N/C:P/I:N/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 5.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-46816
severity: LOW
baseScore: 2.9
vectorString: AV:A/AC:M/AU:N/C:P/I:N/A:N
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 5.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-46816 // JVNDB: JVNDB-2010-003380 // CNNVD: CNNVD-201011-094 // NVD: CVE-2010-4211

PROBLEMTYPE DATA

problemtype:CWE-287

Trust: 1.9

sources: VULHUB: VHN-46816 // JVNDB: JVNDB-2010-003380 // NVD: CVE-2010-4211

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-201011-094

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-201011-094

CONFIGURATIONS

sources: JVNDB: JVNDB-2010-003380

PATCH

title:PayPal on your iPhoneurl:https://personal.paypal.com/us/cgi-bin/?&cmd=_render-content&content_ID=marketing_us/mobile_iphone

Trust: 0.8

title:PayPalurl:http://itunes.apple.com/us/app/paypal/id283646709

Trust: 0.8

sources: JVNDB: JVNDB-2010-003380

EXTERNAL IDS

db:NVDid:CVE-2010-4211

Trust: 2.8

db:BIDid:44657

Trust: 2.0

db:VUPENid:ADV-2010-2887

Trust: 1.7

db:JVNDBid:JVNDB-2010-003380

Trust: 0.8

db:CNNVDid:CNNVD-201011-094

Trust: 0.7

db:XFid:63002

Trust: 0.6

db:MCAFEEid:SB10001

Trust: 0.2

db:SECUNIAid:34949

Trust: 0.2

db:VULHUBid:VHN-46816

Trust: 0.1

db:PACKETSTORMid:77183

Trust: 0.1

db:PACKETSTORMid:77170

Trust: 0.1

sources: VULHUB: VHN-46816 // BID: 44657 // JVNDB: JVNDB-2010-003380 // PACKETSTORM: 77183 // PACKETSTORM: 77170 // CNNVD: CNNVD-201011-094 // NVD: CVE-2010-4211

REFERENCES

url:http://online.wsj.com/article/sb10001424052748703506904575592782874885808.html

Trust: 2.0

url:http://www.securityfocus.com/bid/44657

Trust: 1.7

url:http://itunes.apple.com/us/app/paypal/id283646709

Trust: 1.7

url:http://news.cnet.com/8301-27080_3-20021730-245.html

Trust: 1.7

url:http://viaforensics.com/press-releases/viaforensics-uncovers-paypal-application-vulnerability.html

Trust: 1.7

url:http://viaforensics.com/security/viaforensics-uncovers-significant-vulnerability-paypal-iphone.html

Trust: 1.7

url:http://www.vupen.com/english/advisories/2010/2887

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/63002

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-4211

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-4211

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/63002

Trust: 0.6

url:http://itunes.apple.com/us/app/paypal/id283646709?mt=8#

Trust: 0.3

url:https://personal.paypal.com/us/cgi-bin/?&cmd=_render-content&content_id=marketing_us/mobile_iphone

Trust: 0.3

url:http://blog.zoller.lu/2009/04/mcafee-multiple-bypassesevasions-ziprar.html

Trust: 0.2

url:https://kc.mcafee.com/corporate/index?page=content&id=sb10001&actp=list_recent

Trust: 0.2

url:http://www.mcafee.com/apps/downloads/security_updates/dat.asp

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/34949/

Trust: 0.1

url:http://secunia.com/advisories/try_vi/request_2008_report/

Trust: 0.1

url:http://www.mcafee.com

Trust: 0.1

url:http://blog.zoller.lu/2009/04/case-for-av-bypassesevasions.html

Trust: 0.1

url:http://blog.zoller.lu/2008/09/notification-and-disclosure-policy.html

Trust: 0.1

url:http://secunia.com/

Trust: 0.1

url:http://lists.grok.org.uk/full-disclosure-charter.html

Trust: 0.1

sources: VULHUB: VHN-46816 // BID: 44657 // JVNDB: JVNDB-2010-003380 // PACKETSTORM: 77183 // PACKETSTORM: 77170 // CNNVD: CNNVD-201011-094 // NVD: CVE-2010-4211

CREDITS

unknown

Trust: 0.3

sources: BID: 44657

SOURCES

db:VULHUBid:VHN-46816
db:BIDid:44657
db:JVNDBid:JVNDB-2010-003380
db:PACKETSTORMid:77183
db:PACKETSTORMid:77170
db:CNNVDid:CNNVD-201011-094
db:NVDid:CVE-2010-4211

LAST UPDATE DATE

2025-04-11T22:56:34.903000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-46816date:2017-08-17T00:00:00
db:BIDid:44657date:2015-04-13T21:02:00
db:JVNDBid:JVNDB-2010-003380date:2012-03-27T00:00:00
db:CNNVDid:CNNVD-201011-094date:2010-11-10T00:00:00
db:NVDid:CVE-2010-4211date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-46816date:2010-11-09T00:00:00
db:BIDid:44657date:2010-11-04T00:00:00
db:JVNDBid:JVNDB-2010-003380date:2012-03-27T00:00:00
db:PACKETSTORMid:77183date:2009-05-02T05:21:02
db:PACKETSTORMid:77170date:2009-05-01T02:03:00
db:CNNVDid:CNNVD-201011-094date:2010-11-10T00:00:00
db:NVDid:CVE-2010-4211date:2010-11-09T01:00:02.697