The autoupdate implementation in TimeDoctor Pro 1.4.72.3 on Windows relies on unsigned installer files that are retrieved without use of SSL, which makes it easier for man-in-the-middle attackers to execute arbitrary code via a crafted file.
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/535881/100/700/threaded | mailing list |
http://www.securityfocus.com/bid/75572 | vdb entry |
http://seclists.org/fulldisclosure/2015/Jun/105 | mailing list exploit |