CNVD-2017-07361

Vulnerability from cnvd - Published: 2017-05-24
VLAI Severity ?
Title
Google Android Qualcomm Secure Execution Environment Communicator Driver权限提升漏洞(CNVD-2017-07361)
Description
Android on Nexus 5X等是美国谷歌(Google)公司和开放手持设备联盟(简称OHA)共同开发的一套运行于Nexus 5X等(智能设备)中并以Linux为基础的开源操作系统。Qualcomm Secure Execution Environment Communicator Driver是使用在其中的一个为用户空间和Qualcomm Secure Execution Environment之间提供通信的接口。 Google Android Qualcomm Secure Execution Environment Communicator driver存在安全漏洞,远程攻击者可利用漏洞构建恶意应用,诱使用户解析,可提升权限。
Severity
Patch Name
Google Android Qualcomm Secure Execution Environment Communicator Driver权限提升漏洞(CNVD-2017-07361)的补丁
Patch Description
Android on Nexus 5X等是美国谷歌(Google)公司和开放手持设备联盟(简称OHA)共同开发的一套运行于Nexus 5X等(智能设备)中并以Linux为基础的开源操作系统。Qualcomm Secure Execution Environment Communicator Driver是使用在其中的一个为用户空间和Qualcomm Secure Execution Environment之间提供通信的接口。 Google Android Qualcomm Secure Execution Environment Communicator driver存在安全漏洞,远程攻击者可利用漏洞构建恶意应用,诱使用户解析,可提升权限。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

用户可参考如下厂商提供的安全补丁以修复该漏洞: https://source.android.com/security/bulletin/2017-05-01

Reference
https://source.android.com/security/bulletin/2017-05-01 http://www.securityfocus.com/bid/98186
Impacted products
Name
['Google Nexus 6P', 'Google Nexus 6', 'Google Nexus 5X', 'Google Pixel', 'Google Pixel XL', 'Google Android One']
Show details on source website

{
  "bids": {
    "bid": {
      "bidNumber": "98186"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2017-0613"
    }
  },
  "description": "Android on Nexus 5X\u7b49\u662f\u7f8e\u56fd\u8c37\u6b4c\uff08Google\uff09\u516c\u53f8\u548c\u5f00\u653e\u624b\u6301\u8bbe\u5907\u8054\u76df\uff08\u7b80\u79f0OHA\uff09\u5171\u540c\u5f00\u53d1\u7684\u4e00\u5957\u8fd0\u884c\u4e8eNexus 5X\u7b49\uff08\u667a\u80fd\u8bbe\u5907\uff09\u4e2d\u5e76\u4ee5Linux\u4e3a\u57fa\u7840\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edf\u3002Qualcomm Secure Execution Environment Communicator Driver\u662f\u4f7f\u7528\u5728\u5176\u4e2d\u7684\u4e00\u4e2a\u4e3a\u7528\u6237\u7a7a\u95f4\u548cQualcomm Secure Execution Environment\u4e4b\u95f4\u63d0\u4f9b\u901a\u4fe1\u7684\u63a5\u53e3\u3002 \r\n\r\nGoogle Android Qualcomm Secure Execution Environment Communicator driver\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u6f0f\u6d1e\u6784\u5efa\u6076\u610f\u5e94\u7528\uff0c\u8bf1\u4f7f\u7528\u6237\u89e3\u6790\uff0c\u53ef\u63d0\u5347\u6743\u9650\u3002",
  "discovererName": "Google",
  "formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttps://source.android.com/security/bulletin/2017-05-01",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2017-07361",
  "openTime": "2017-05-24",
  "patchDescription": "Android on Nexus 5X\u7b49\u662f\u7f8e\u56fd\u8c37\u6b4c\uff08Google\uff09\u516c\u53f8\u548c\u5f00\u653e\u624b\u6301\u8bbe\u5907\u8054\u76df\uff08\u7b80\u79f0OHA\uff09\u5171\u540c\u5f00\u53d1\u7684\u4e00\u5957\u8fd0\u884c\u4e8eNexus 5X\u7b49\uff08\u667a\u80fd\u8bbe\u5907\uff09\u4e2d\u5e76\u4ee5Linux\u4e3a\u57fa\u7840\u7684\u5f00\u6e90\u64cd\u4f5c\u7cfb\u7edf\u3002Qualcomm Secure Execution Environment Communicator Driver\u662f\u4f7f\u7528\u5728\u5176\u4e2d\u7684\u4e00\u4e2a\u4e3a\u7528\u6237\u7a7a\u95f4\u548cQualcomm Secure Execution Environment\u4e4b\u95f4\u63d0\u4f9b\u901a\u4fe1\u7684\u63a5\u53e3\u3002 \r\n\r\nGoogle Android Qualcomm Secure Execution Environment Communicator driver\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u6f0f\u6d1e\u6784\u5efa\u6076\u610f\u5e94\u7528\uff0c\u8bf1\u4f7f\u7528\u6237\u89e3\u6790\uff0c\u53ef\u63d0\u5347\u6743\u9650\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Google Android Qualcomm Secure Execution Environment Communicator Driver\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\uff08CNVD-2017-07361\uff09\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Google Nexus  6P",
      "Google Nexus  6",
      "Google Nexus  5X",
      "Google Pixel",
      "Google Pixel XL",
      "Google Android One"
    ]
  },
  "referenceLink": "https://source.android.com/security/bulletin/2017-05-01\r\nhttp://www.securityfocus.com/bid/98186",
  "serverity": "\u9ad8",
  "submitTime": "2017-05-09",
  "title": "Google Android Qualcomm Secure Execution Environment Communicator Driver\u6743\u9650\u63d0\u5347\u6f0f\u6d1e\uff08CNVD-2017-07361\uff09"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…