ID CVE-2015-2078
Summary The SDK for Komodia Redirector with SSL Digestor, as used in Lavasoft Ad-Aware Web Companion 1.1.885.1766 and Ad-Aware AdBlocker (alpha) 1.3.69.1, Qustodio for Windows, Atom Security, Inc. StaffCop 5.8, and other products, does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers, a different vulnerability than CVE-2015-2077.
References
Vulnerable Configurations
  • cpe:2.3:a:komodia:redirector_sdk:*:*:*:*:*:*:*:*
    cpe:2.3:a:komodia:redirector_sdk:*:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 28-02-2015 - 02:59)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:N/I:P/A:N
refmap via4
cert TA15-051A
cert-vn VU#529496
misc
sectrack 1031779
Last major update 28-02-2015 - 02:59
Published 24-02-2015 - 23:59
Last modified 28-02-2015 - 02:59
Back to Top