{"vuid":"VU#432608","idnumber":"432608","name":"IBM Notes Traveler for Android transmits user credentials over HTTP","keywords":["IBM","Notes","Lotus","Traveler","HTTP","HTTPS"],"overview":"The IBM Notes Traveler application for Android does not enforce the use of HTTPS for transmitting user credentials, which can allow an attacker to obtain this information.","clean_desc":"IBM Notes Traveler (formerly known as Lotus Notes Traveler) is an application that allows access to email, calendar, and contacts from mobile devices and tablets. CWE-319: Cleartext Transmission of Sensitive Information\nIBM Notes Traveler prior to version 9.0.1.3 uses HTTP by default for transmitting login credentials.","impact":"An attacker with access to network traffic can obtain user credentials for IBM Notes.","resolution":"Apply an update This issue is addressed in version 9.0.1.3 of Notes Traveler for Android. This version will use HTTPS by default and will warn the user when HTTP is configured.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by Will Dormann of the CERT/CC.","author":"This document was written by Will Dormann.","public":["http://www-01.ibm.com/support/docview.wss?uid=swg21688840","http://cwe.mitre.org/data/definitions/319.html"],"cveids":["CVE-2014-6130"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2014-09-16T20:08:48Z","publicdate":"2014-10-31T00:00:00Z","datefirstpublished":"2014-11-07T19:51:41Z","dateupdated":"2014-11-13T14:51:03Z","revision":9,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"P","cvss_integrityimpact":"--","cvss_availabilityimpact":"N","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"5","cvss_basevector":"AV:N/AC:L/Au:N/C:P/I:--/A:N","cvss_temporalscore":"3.9","cvss_environmentalscore":"2.91185042022","cvss_environmentalvector":"CDP:ND/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}