Android Picasa in Android 3.0 and 2.x through 2.3.4 uses a cleartext HTTP session when transmitting the authToken obtained from ClientLogin, which allows remote attackers to gain privileges and access private pictures and web albums by sniffing the token from connections with picasaweb.google.com.
                
            References
                    Configurations
                    Configuration 1 (hide)
            
            
  | 
    
History
                    21 Nov 2024, 01:28
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://android.git.kernel.org/?p=platform/packages/apps/Gallery3D.git%3Ba=commit%3Bh=7a763db1c15bb6436be85a3f23382e4171970b6e - | |
| References | () http://android.git.kernel.org/?p=platform/packages/apps/Gallery3D.git%3Ba=commit%3Bh=9a418de454e5ce078c98f41b5c18e3bb9175bd20 - | |
| References | () http://www.uni-ulm.de/en/in/mi/staff/koenings/catching-authtokens.html - | 
07 Nov 2023, 02:07
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
    
        
        
  | 
| References | () http://www.uni-ulm.de/en/in/mi/staff/koenings/catching-authtokens.html - | 
Information
                Published : 2011-07-08 17:55
Updated : 2025-04-11 00:51
NVD link : CVE-2011-2344
Mitre link : CVE-2011-2344
CVE.ORG link : CVE-2011-2344
JSON object : View
Products Affected
                - android
 
CWE
                
                    
                        
                        CWE-310
                        
            Cryptographic Issues
