Vulnerability Name: | CVE-2016-3861 (CCN-116637) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2016-09-06 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2016-09-06 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2017-09-03 | ||||||||||||||||||||||||||||||||||||||||
Summary: | LibUtils in Android 4.x before 4.4.4, 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-09-01, and 7.0 before 2016-09-01 mishandles conversions between Unicode character encodings with different encoding widths, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via a crafted file, aka internal bug 29250543. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.0 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-264 CWE-119 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||
References: | Source: CCN Type: Google Web site Android Source: MITRE Type: CNA CVE-2016-3861 Source: CONFIRM Type: Vendor Advisory http://source.android.com/security/bulletin/2016-09-01.html Source: BID Type: UNKNOWN 92811 Source: CCN Type: BID-92811 Google Android libutils CVE-2016-3861 Arbitrary Code Execution Vulnerability Source: SECTRACK Type: UNKNOWN 1036763 Source: CONFIRM Type: Issue Tracking, Patch https://android.googlesource.com/platform/frameworks/av/+/3944c65637dfed14a5a895685edfa4bacaf9f76e Source: CONFIRM Type: Issue Tracking, Patch https://android.googlesource.com/platform/frameworks/base/+/866dc26ad4a98cc835d075b627326e7d7e52ffa1 Source: CONFIRM Type: Issue Tracking, Patch https://android.googlesource.com/platform/frameworks/native/+/1f4b49e64adf4623eefda503bca61e253597b9bf Source: CONFIRM Type: Issue Tracking, Patch https://android.googlesource.com/platform/system/core/+/ecf5fd58a8f50362ce9e8d4245a33d56f29f142b Source: CCN Type: Google Security Research Issue 840 Android - libutils UTF16 to UTF8 conversion heap-buffer-overflow Source: XF Type: UNKNOWN android-cve20163861-bo(116637) Source: CCN Type: Packet Storm Security [09-08-2016] Android libutils Heap Buffer Overflow Source: CCN Type: Android Open Source Project Nexus Security Bulletin - September 2016 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [09-08-2016] Source: EXPLOIT-DB Type: UNKNOWN 40354 Source: CCN Type: WhiteSource Vulnerability Database CVE-2016-3861 | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |