2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2017-0448" ,
"sourceIdentifier" : "security@android.com" ,
"published" : "2017-02-08T15:59:01.957" ,
2024-11-23 07:09:57 +00:00
"lastModified" : "2024-11-21T03:03:00.113" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "An information disclosure vulnerability in the NVIDIA video driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as High because it could be used to access sensitive data without explicit user permission. Product: Android. Versions: Kernel-3.10. Android ID: A-32721029. References: N-CVE-2017-0448."
} ,
{
"lang" : "es" ,
"value" : "Una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en el controlador de v\u00eddeo NVIDIA podr\u00eda habilitar a una aplicaci\u00f3n local maliciosa acceder a datos fuera de sus niveles de permiso. Este problema est\u00e1 clasificado como High porque podr\u00eda ser utilizado para acceso a datos sensibles sin permisos de usuario expl\u00edcitos. Producto: Android. Versiones: Kernel-3.10. Android ID: A-32721029. Referencias: N-CVE-2017-0448."
}
] ,
"metrics" : {
"cvssMetricV30" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.0" ,
"vectorString" : "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" ,
2024-11-23 07:09:57 +00:00
"baseScore" : 5.5 ,
"baseSeverity" : "MEDIUM" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "NONE" ,
2024-11-23 07:09:57 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 3.6
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:P/I:N/A:N" ,
2024-11-23 07:09:57 +00:00
"baseScore" : 4.3 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "NONE" ,
2024-11-23 07:09:57 +00:00
"availabilityImpact" : "NONE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : true
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-200"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ,
"versionEndIncluding" : "7.1.1" ,
"matchCriteriaId" : "0F11609D-D1B4-4DD6-8CC7-A224344E1E67"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1C37F47C-C217-4BCF-A758-14E1BDBAD63D"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://www.securityfocus.com/bid/96105" ,
"source" : "security@android.com" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://www.securitytracker.com/id/1037798" ,
"source" : "security@android.com"
} ,
{
"url" : "https://source.android.com/security/bulletin/2017-02-01.html" ,
"source" : "security@android.com" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2024-11-23 07:09:57 +00:00
} ,
{
"url" : "http://www.securityfocus.com/bid/96105" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://www.securitytracker.com/id/1037798" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://source.android.com/security/bulletin/2017-02-01.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}