Title: |
Vulnerability in MiTalk (米聊) for Android |
Time: |
05 Dec 2011 |
Author: |
Daoyuan Wu*, Xiapu Luo* and Rocky K. C. Chang |
|
Department of Computing, The Hong Kong Polytechnic University, Hong Kong |
|
* authors with equal contributions |
CVE ID: |
CVE-2011-4697 |
Category: |
Newly Released
|
Related Vendor: |
Xiaomi Inc. |
Archive Time: |
December 5, 2011 HKT |
Package Name: |
com.xiaomi.channel |
Full Name: |
MiTalk Messenger (“米聊” in Chinese name) |
Affected Version: |
1.0, 2.1.280 and 2.1.310 (the latest version in 05 Dec 2011) |
Package Installs: |
100,000 - 500,000 |
Market Link: |
https://market.android.com/details?id=com.xiaomi.channel |
Status: |
Breif impact description now releases to public.
|
Breif Description: |
Allow a malicious application to access and manipulate user’s sensitive contacts, sms and etc. |
Contact Time: |
Has patched the vulnerability in version 2.1.320 in December 9, 2011 before we try to contact them.
|
Confirm Time: |
No longer maintain |
Patched Time: |
December 9, 2011 HKT |
Patched Status: |
Has patched the vulnerability in version 2.1.320. |
Although we only mention one or several affected version in our report, other versions may also be vulnerable, e.g. lower version, pad version or paid version.