{"vuid":"VU#366544","idnumber":"366544","name":"Adtrustmedia PrivDog fails to validate SSL certificates","keywords":["Comodo","NetFilterSDK.com","PrivDog","FF_SSL_VERIFY","Adware"],"overview":"Adtrustmedia PrivDog fails to validate SSL certificates, making systems broadly vulnerable to HTTPS spoofing.","clean_desc":"Adtrustmedia PrivDog is a Windows application that advertises \"... safer, faster and more private web browsing.\" Privdog installs a Man-in-the-Middle (MITM) proxy as well as a new trusted root CA certificate. The MITM capabilities are provided by NetFilterSDK.com. Although the root CA certificate is generated at install time, resulting in a different certificate for each installation, Privdog does not use the SSL certificate validation capabilities that the NetFilter SDK provides. This means that web browsers will not display any warnings when a spoofed or MITM-proxied HTTPS website is visited. We have confirmed that PrivDog version 3.0.96.0 is affected. Adtrustmedia PrivDog is promoted by the Comodo Group, which is an organization that offers SSL certificates and authentication solutions. Users can test whether they are vulnerable to the PrivDog vulnerability and other similar vulnerabilities by visiting Filippo Valsorda's SSL test page.","impact":"An attacker can spoof HTTPS sites and intercept HTTPS traffic without triggering browser certificate warnings in affected systems.","resolution":"Apply an update This issue is addressed in PrivDog 3.0.105.0. This version of PrivDog appears to disable SSL interception for connections where the upstream certificate is not valid. Alternatively, consider the following workaround:","workarounds":"Uninstall PrivDog Uninstalling PrivDog will remove the MITM proxy and the root CA certificate, thus restoring SSL validation to affected systems.","sysaffected":"","thanks":"This vulnerability was publicly reported by Hanno Böck.","author":"This document was written by Will Dormann.","public":["https://blog.hboeck.de/archives/865-Software-Privdog-worse-than-Superfish.html","https://blog.hboeck.de/archives/866-PrivDog-wants-to-protect-your-privacy-by-sending-data-home-in-clear-text.html","http://netfiltersdk.com/help/ProtocolFilters/FT_SSL.htm","http://www.privdog.com/advisory.html","http://www.privdog.com/","https://help.comodo.com/topic-72-1-451-6840-.html","https://help.comodo.com/topic-120-1-279-6108-.html","https://filippo.io/Badfish/","https://www.eff.org/deeplinks/2015/02/dear-software-vendors-please-stop-trying-intercept-your-customers-encrypted"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2015-02-23T13:19:46Z","publicdate":"2015-02-22T00:00:00Z","datefirstpublished":"2015-02-23T14:04:51Z","dateupdated":"2015-02-26T14:15:05Z","revision":71,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"C","cvss_integrityimpact":"P","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"W","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"ND","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"8.5","cvss_basevector":"AV:N/AC:L/Au:N/C:C/I:P/A:N","cvss_temporalscore":"8.1","cvss_environmentalscore":"8.0495164932","cvss_environmentalvector":"CDP:ND/TD:ND/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}