| Vulnerability Name: | CVE-2017-0531 (CCN-123123) | ||||||||||||||||
| Assigned: | 2016-11-29 | ||||||||||||||||
| Published: | 2017-03-06 | ||||||||||||||||
| Updated: | 2017-07-17 | ||||||||||||||||
| Summary: | An information disclosure vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32877245. References: QC-CR#1087469. | ||||||||||||||||
| CVSS v3 Severity: | 4.7 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N) 4.1 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
2.9 Low (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C)
| ||||||||||||||||
| CVSS v2 Severity: | 2.6 Low (CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N)
| ||||||||||||||||
| Vulnerability Type: | CWE-200 | ||||||||||||||||
| Vulnerability Consequences: | Obtain Information | ||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2017-0531 Source: CCN Type: Android Open Source Project Android Security BulletinMarch 2017 Source: BID Type: UNKNOWN 96743 Source: CCN Type: BID-96743 Google Android Qualcomm Wi-Fi Driver Multiple Information Disclosure Vulnerabilities Source: SECTRACK Type: UNKNOWN 1037968 Source: XF Type: UNKNOWN android-cve20170531-info-disc(123123) Source: CONFIRM Type: UNKNOWN https://source.android.com/security/bulletin/2017-03-01 Source: MISC Type: Patch, Vendor Advisory https://source.android.com/security/bulletin/2017-03-01.html Source: CONFIRM Type: Patch https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=530f3a0fd837ed105eddaf99810bc13d97dc4302 | ||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||
| Oval Definitions | |||||||||||||||||
| |||||||||||||||||
| BACK | |||||||||||||||||