First published: Fri Jul 08 2011(Updated: )
Android Picasa in Android 3.0 and 2.x through 2.3.4 uses a cleartext HTTP session when transmitting the authToken obtained from ClientLogin, which allows remote attackers to gain privileges and access private pictures and web albums by sniffing the token from connections with picasaweb.google.com.
Credit: cve-coordination@google.com chrome-cve-admin@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | =2.1 | |
Android | =2.2 | |
Android | =2.2-rev1 | |
Android | =2.2.1 | |
Android | =2.2.2 | |
Android | =2.3-rev1 | |
Android | =2.3.3 | |
Android | =2.3.4 | |
Android | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2011-2344 is classified as high due to the risk of unauthorized access to private pictures and web albums.
To fix CVE-2011-2344, update to a version of Android that does not use cleartext HTTP for transmitting authTokens.
CVE-2011-2344 allows remote attackers to sniff the authToken, potentially granting them access to private data in Picasa.
CVE-2011-2344 affects Android versions 2.1, 2.2, 2.3, and 3.0.
Using affected Android versions with Picasa is not safe due to the risk of exposure of private data.