ghsa-mcc8-9378-x3rg
Vulnerability from github
Published
2022-05-17 02:28
Modified
2022-05-17 02:28
Severity
Details

A remote code execution vulnerability in AOSP Messaging could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as High due to the possibility of remote code execution within the context of an unprivileged process. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33388925.

Show details on source website


{
  "affected": [],
  "aliases": [
    "CVE-2017-0476"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-119"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2017-03-08T01:59:00Z",
    "severity": "HIGH"
  },
  "details": "A remote code execution vulnerability in AOSP Messaging could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as High due to the possibility of remote code execution within the context of an unprivileged process. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33388925.",
  "id": "GHSA-mcc8-9378-x3rg",
  "modified": "2022-05-17T02:28:44Z",
  "published": "2022-05-17T02:28:44Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0476"
    },
    {
      "type": "WEB",
      "url": "https://source.android.com/security/bulletin/2017-03-01"
    },
    {
      "type": "WEB",
      "url": "https://source.android.com/security/bulletin/2017-03-01.html"
    },
    {
      "type": "WEB",
      "url": "http://www.securityfocus.com/bid/96756"
    },
    {
      "type": "WEB",
      "url": "http://www.securitytracker.com/id/1037968"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
      "type": "CVSS_V3"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...