2024-12-08 03:06:42 +00:00

154 lines
4.8 KiB
JSON

{
"id": "CVE-2017-0563",
"sourceIdentifier": "security@android.com",
"published": "2017-04-07T22:59:01.043",
"lastModified": "2024-11-21T03:03:13.863",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An elevation of privilege vulnerability in the HTC touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10. Android ID: A-32089409."
},
{
"lang": "es",
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios en el controlador de pantalla t\u00e1ctil de HTC podr\u00eda permitir que una aplicaci\u00f3n maliciosa local ejecute c\u00f3digo arbitrario dentro del contexto del n\u00facleo. Este problema est\u00e1 clasificado como cr\u00edtico debido a la posibilidad de un compromiso de dispositivo permanente local, que puede requerir reflashing del sistema operativo para reparar el dispositivo. Producto: Android. Versiones: Kernel-3.10. ID de Android: A-32089409."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"baseScore": 9.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-345"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1C37F47C-C217-4BCF-A758-14E1BDBAD63D"
}
]
}
]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2017/May/19",
"source": "security@android.com"
},
{
"url": "http://www.securityfocus.com/bid/97342",
"source": "security@android.com"
},
{
"url": "http://www.securitytracker.com/id/1038201",
"source": "security@android.com"
},
{
"url": "https://alephsecurity.com/vulns/aleph-2017009",
"source": "security@android.com"
},
{
"url": "https://github.com/alephsecurity/PoCs/tree/master/CVE-2017-0563",
"source": "security@android.com"
},
{
"url": "https://source.android.com/security/bulletin/2017-04-01",
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://seclists.org/fulldisclosure/2017/May/19",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/97342",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securitytracker.com/id/1038201",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://alephsecurity.com/vulns/aleph-2017009",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/alephsecurity/PoCs/tree/master/CVE-2017-0563",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://source.android.com/security/bulletin/2017-04-01",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}