Spoon Signature Verification Security Bypass Vulnerability

Spoon is prone to a signature-verification security-bypass vulnerability.

An attacker may exploit this issue through man-in-the-middle attacks. Successful attacks may allow the attacker to bypass certain security restrictions and to perform unauthorized actions. This may aid in further attacks.


 

Privacy Statement
Copyright 2010, SecurityFocus