Lucene search

K
certCERTVU:704916
HistoryApr 02, 2013 - 12:00 a.m.

The TigerText Free Consumer Private Texting App (iOS) sends unencrypted user information in support requests

2013-04-0200:00:00
www.kb.cert.org
24

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.004 Low

EPSS

Percentile

74.3%

Overview

The TigerText Free Consumer Private Texting App (iOS) sends unencrypted user information to TigerText support.

Description

The TigerText app generates an unencrypted log file containing the TigerText username and password on the device when a user taps on “Contact Customer Support.” An email is generated to support that sends the log information with it. This does not impact the TigerText Pro application.


Impact

TigerText usernames and passwords may be viewable by TigerText support or others with access to the device or email. A recipient of the email containing the log file could use credentials to impersonate the user, gaining unauthorized access to any non-expired messages.


Solution

Apply an Update

An updated app is available from the iTunes App Store. Version 3.1.402 or above contains a patch that removes sensitive information from the log file. The latest version is available here: <https://itunes.apple.com/us/app/tiger-text/id355832697?mt=8>


Vendor Information

704916

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

TigerText Affected

Notified: February 07, 2013 Updated: March 18, 2013

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

Vendor References

CVSS Metrics

Group Score Vector
Base 1.7 AV:L/AC:L/Au:S/C:P/I:N/A:N
Temporal 1.4 E:F/RL:OF/RC:C
Environmental 0.4 CDP:N/TD:L/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to Pedro Paixao for reporting this vulnerability.

This document was written by Chris King.

Other Information

CVE IDs: CVE-2013-0128
Date Public: 2013-04-02 Date First Published:

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.004 Low

EPSS

Percentile

74.3%

Related for VU:704916