Vulnerability Name: | CVE-2017-0420 (CCN-121763) |
Assigned: | 2016-11-29 |
Published: | 2017-02-06 |
Updated: | 2017-07-25 |
Summary: | An information disclosure vulnerability in AOSP Mail could enable a local malicious application to bypass operating system protections that isolate application data from other applications. This issue is rated as High because it could be used to gain access to data that the application does not have access to. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32615212.
|
CVSS v3 Severity: | 5.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) 4.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): Required | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): None Availibility (A): None | 4.7 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N) 4.1 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): High Privileges Required (PR): None User Interaction (UI): Required | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): None Availibility (A): None |
|
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): None Availibility (A): None | 3.8 Low (CCN CVSS v2 Vector: AV:L/AC:H/Au:S/C:C/I:N/A:N)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): High Athentication (Au): Single_Instance
| Impact Metrics: | Confidentiality (C): Complete Integrity (I): None Availibility (A): None |
|
Vulnerability Type: | CWE-200
|
Vulnerability Consequences: | Obtain Information |
References: | Source: CCN Type: Google Web site Android
Source: MITRE Type: CNA CVE-2017-0420
Source: BID Type: Third Party Advisory, VDB Entry 96093
Source: CCN Type: BID-96093 Google Android AOSP Mail CVE-2017-0420 Information Disclosure Vulnerability
Source: SECTRACK Type: UNKNOWN 1037798
Source: XF Type: UNKNOWN android-cve20170420-info-disc(121763)
Source: CCN Type: Android Open Source Project Android Security Bulletin—February 2017
Source: CONFIRM Type: Vendor Advisory https://source.android.com/security/bulletin/2017-02-01.html
|
Vulnerable Configuration: | Configuration 1: cpe:/o:google:android:4.0:*:*:*:*:*:*:*OR cpe:/o:google:android:4.0.1:*:*:*:*:*:*:*OR cpe:/o:google:android:4.0.2:*:*:*:*:*:*:*OR cpe:/o:google:android:4.0.3:*:*:*:*:*:*:*OR cpe:/o:google:android:4.0.4:*:*:*:*:*:*:*OR cpe:/o:google:android:4.1:*:*:*:*:*:*:*OR cpe:/o:google:android:4.1.2:*:*:*:*:*:*:*OR cpe:/o:google:android:4.2:*:*:*:*:*:*:*OR cpe:/o:google:android:4.2.1:*:*:*:*:*:*:*OR cpe:/o:google:android:4.2.2:*:*:*:*:*:*:*OR cpe:/o:google:android:4.3:*:*:*:*:*:*:*OR cpe:/o:google:android:4.3.1:*:*:*:*:*:*:*OR cpe:/o:google:android:4.4:*:*:*:*:*:*:*OR cpe:/o:google:android:4.4.1:*:*:*:*:*:*:*OR cpe:/o:google:android:4.4.2:*:*:*:*:*:*:*OR cpe:/o:google:android:4.4.3:*:*:*:*:*:*:*OR cpe:/o:google:android:4.4.4:*:*:*:*:*:*:*OR cpe:/o:google:android:5.0:*:*:*:*:*:*:*OR cpe:/o:google:android:5.0.1:*:*:*:*:*:*:*OR cpe:/o:google:android:5.0.2:*:*:*:*:*:*:*OR cpe:/o:google:android:5.1:*:*:*:*:*:*:*OR cpe:/o:google:android:5.1.0:*:*:*:*:*:*:*OR cpe:/o:google:android:5.1.1:*:*:*:*:*:*:*OR cpe:/o:google:android:6.0:*:*:*:*:*:*:*OR cpe:/o:google:android:6.0.1:*:*:*:*:*:*:*OR cpe:/o:google:android:7.0:*:*:*:*:*:*:*OR cpe:/o:google:android:7.1.0:*:*:*:*:*:*:*OR cpe:/o:google:android:7.1.1:*:*:*:*:*:*:* Configuration CCN 1: cpe:/o:google:android:*:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |