Vulnerability Name: | CVE-2017-0592 (CCN-126557) |
Assigned: | 2016-11-29 |
Published: | 2017-05-01 |
Updated: | 2017-05-19 |
Summary: | A remote code execution vulnerability in FLACExtractor.cpp in libstagefright in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-34970788.
|
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): Required | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High | 7.8 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 6.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): Required | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High |
|
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Authentication (Au): None | Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete | 6.8 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Athentication (Au): Single_Instance
| Impact Metrics: | Confidentiality (C): Complete Integrity (I): Complete Availibility (A): Complete |
|
Vulnerability Type: | CWE-119
|
Vulnerability Consequences: | Gain Access |
References: | Source: CCN Type: Google Web site Android
Source: MITRE Type: CNA CVE-2017-0592
Source: BID Type: Third Party Advisory, VDB Entry 98125
Source: CCN Type: BID-98125 Google Android Mediaserver CVE-2017-0592 Remote Code Execution Vulnerability
Source: CONFIRM Type: Issue Tracking, Patch, Third Party Advisory https://android.googlesource.com/platform/frameworks/av/+/acc192347665943ca674acf117e4f74a88436922
Source: XF Type: UNKNOWN android-cve20170592-code-exec(126557)
Source: CCN Type: Android Open Source Project Android Security BulletinMay 2017
Source: CONFIRM Type: Patch, Vendor Advisory https://source.android.com/security/bulletin/2017-05-01
|
Vulnerable Configuration: | Configuration 1: cpe:/o:google:android:4.0:*:*:*:*:*:*:*OR cpe:/o:google:android:4.0.1:*:*:*:*:*:*:*OR cpe:/o:google:android:4.0.2:*:*:*:*:*:*:*OR cpe:/o:google:android:4.0.3:*:*:*:*:*:*:*OR cpe:/o:google:android:4.0.4:*:*:*:*:*:*:*OR cpe:/o:google:android:4.1:*:*:*:*:*:*:*OR cpe:/o:google:android:4.1.2:*:*:*:*:*:*:*OR cpe:/o:google:android:4.2:*:*:*:*:*:*:*OR cpe:/o:google:android:4.2.1:*:*:*:*:*:*:*OR cpe:/o:google:android:4.2.2:*:*:*:*:*:*:*OR cpe:/o:google:android:4.3:*:*:*:*:*:*:*OR cpe:/o:google:android:4.3.1:*:*:*:*:*:*:*OR cpe:/o:google:android:4.4:*:*:*:*:*:*:*OR cpe:/o:google:android:4.4.1:*:*:*:*:*:*:*OR cpe:/o:google:android:4.4.2:*:*:*:*:*:*:*OR cpe:/o:google:android:4.4.3:*:*:*:*:*:*:*OR cpe:/o:google:android:4.4.4:*:*:*:*:*:*:*OR cpe:/o:google:android:5.0:*:*:*:*:*:*:*OR cpe:/o:google:android:5.0.1:*:*:*:*:*:*:*OR cpe:/o:google:android:5.0.2:*:*:*:*:*:*:*OR cpe:/o:google:android:5.1:*:*:*:*:*:*:*OR cpe:/o:google:android:5.1.0:*:*:*:*:*:*:*OR cpe:/o:google:android:5.1.1:*:*:*:*:*:*:*OR cpe:/o:google:android:6.0:*:*:*:*:*:*:*OR cpe:/o:google:android:6.0.1:*:*:*:*:*:*:*OR cpe:/o:google:android:7.0:*:*:*:*:*:*:*OR cpe:/o:google:android:7.1.0:*:*:*:*:*:*:*OR cpe:/o:google:android:7.1.1:*:*:*:*:*:*:*OR cpe:/o:google:android:7.1.2:*:*:*:*:*:*:* Configuration CCN 1: cpe:/o:google:android:4.4.4:*:*:*:*:*:*:*OR cpe:/o:google:android:5.1.1:*:*:*:*:*:*:*OR cpe:/o:google:android:6.0:*:*:*:*:*:*:*OR cpe:/o:google:android:6.0.1:*:*:*:*:*:*:*OR cpe:/o:google:android:5.0.2:*:*:*:*:*:*:*OR cpe:/o:google:android:7.0:*:*:*:*:*:*:*OR cpe:/o:google:android:7.1.1:*:*:*:*:*:*:*OR cpe:/o:google:android:7.1.2:*:*:*:*:*:*:* Denotes that component is vulnerable |
Oval Definitions |
|
BACK |