The ATOK application before 1.0.4 for Android allows remote attackers to read the learning information file, and obtain sensitive input-string information, via a crafted application.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/55728 | vdb entry |
http://jvn.jp/en/jp/JVN93344001/index.html | third party advisory |
http://osvdb.org/85808 | vdb entry |
http://jvndb.jvn.jp/jvndb/JVNDB-2012-000089 | third party advisory |