2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2017-0663" ,
"sourceIdentifier" : "security@android.com" ,
"published" : "2017-06-14T13:29:00.687" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T03:03:24.110" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "A remote code execution vulnerability in libxml2 could enable an attacker using a specially crafted file to execute arbitrary code within the context of an unprivileged process. This issue is rated as High due to the possibility of remote code execution in an application that uses this library. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37104170."
} ,
{
"lang" : "es" ,
"value" : "Una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en libxml2 podr\u00eda permitir a un atacante usar un archivo especialmente dise\u00f1ado para ejecutar c\u00f3digo arbitrario dentro del contexto de un proceso no privilegiado. Este problema se ha calificado como Alto debido a la posibilidad de ejecuci\u00f3n remota de c\u00f3digo en una aplicaci\u00f3n que use esta biblioteca. Producto: Android. Versiones: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. ID de Android: A-37104170"
}
] ,
"metrics" : {
"cvssMetricV30" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.0" ,
"vectorString" : "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 6.8 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : true
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-787"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E3CEEA22-63B4-4702-A400-01349DF0EC1E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E9915371-C730-41F7-B86E-7E4DE0DF5385"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B1D94CDD-DE7B-444E-A3AE-AE9C9A779374"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E70C6D8D-C9C3-4D92-8DFC-71F59E068295"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "691FA41B-C2CE-413F-ABB1-0B22CB322807"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "09E6085C-A61E-4A89-BF80-EDD9A7DF1E47"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D835D592-2423-44C6-804A-3AD010112E7C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "568E2561-A068-46A2-B331-BBA91FC96F0C"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://www.debian.org/security/2017/dsa-3952" ,
"source" : "security@android.com"
} ,
{
"url" : "http://www.securityfocus.com/bid/98877" ,
"source" : "security@android.com" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://www.securitytracker.com/id/1038623" ,
"source" : "security@android.com"
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" ,
2023-04-24 12:24:31 +02:00
"source" : "security@android.com"
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" ,
2023-04-24 12:24:31 +02:00
"source" : "security@android.com"
} ,
{
"url" : "https://security.gentoo.org/glsa/201711-01" ,
"source" : "security@android.com"
} ,
{
"url" : "https://source.android.com/security/bulletin/2017-06-01" ,
"source" : "security@android.com" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "http://www.debian.org/security/2017/dsa-3952" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/98877" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory" ,
"VDB Entry"
]
} ,
{
"url" : "http://www.securitytracker.com/id/1038623" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://security.gentoo.org/glsa/201711-01" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://source.android.com/security/bulletin/2017-06-01" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}