Vulnerability Name: | CVE-2017-0637 (CCN-127277) | ||||||||||||||||
Assigned: | 2016-11-29 | ||||||||||||||||
Published: | 2017-06-05 | ||||||||||||||||
Updated: | 2017-07-08 | ||||||||||||||||
Summary: | A remote code execution vulnerability in libhevc in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process.Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-34064500. | ||||||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
| ||||||||||||||||
Vulnerability Type: | CWE-119 | ||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||
References: | Source: CCN Type: Google Web site Android Source: MITRE Type: CNA CVE-2017-0637 Source: BID Type: Third Party Advisory, VDB Entry 98868 Source: CCN Type: BID-98868 Google Android Media Framework Multiple Memory Corruption Vulnerabilities Source: SECTRACK Type: UNKNOWN 1038623 Source: CONFIRM Type: Issue Tracking, Patch, Vendor Advisory https://android.googlesource.com/platform/external/libhevc/+/ebaa71da6362c497310377df509651974401d258 Source: XF Type: UNKNOWN android-cve20170637-code-exec(127277) Source: CCN Type: Android Open Source Project Android Security BulletinJune 2017 Source: CONFIRM Type: Patch, Vendor Advisory https://source.android.com/security/bulletin/2017-06-01 Source: CCN Type: WhiteSource Vulnerability Database CVE-2017-0637 | ||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||||||
Oval Definitions | |||||||||||||||||
| |||||||||||||||||
BACK |