2024-12-08 03:06:42 +00:00

130 lines
4.0 KiB
JSON

{
"id": "CVE-2017-0528",
"sourceIdentifier": "security@android.com",
"published": "2017-03-08T01:59:02.893",
"lastModified": "2024-11-21T03:03:09.810",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An elevation of privilege vulnerability in the kernel security subsystem could enable a local malicious application to to execute code in the context of a privileged process. This issue is rated as High because it is a general bypass for a kernel level defense in depth or exploit mitigation technology. Product: Android. Versions: Kernel-3.18. Android ID: A-33351919."
},
{
"lang": "es",
"value": "Una vulnerabilidad de elevaci\u00f3n de privilegios en el subsistema de seguridad del kernel podr\u00eda permitir a una aplicaci\u00f3n local maliciosa ejecutar c\u00f3digo en el contexto de un proceso privilegiado. Este problema est\u00e1 calificado como High porque es una elusi\u00f3n general para un nivel de defensa de la tecnolog\u00eda depth o exploit migration. Producto: Android. Versiones: Kernel-3.18. ID de Android: A-33351919."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"baseScore": 9.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "364CAD86-F652-4B84-932A-A8D9146C9010"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/96807",
"source": "security@android.com"
},
{
"url": "http://www.securitytracker.com/id/1037968",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2017-03-01",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2017-03-01.html",
"source": "nvd@nist.gov",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.securityfocus.com/bid/96807",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securitytracker.com/id/1037968",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://source.android.com/security/bulletin/2017-03-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}