First published: Tue Jan 03 2017(Updated: )
An information disclosure vulnerability in id3/ID3.cpp in libstagefright in Mediaserver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it could be used to access sensitive data without permission. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1. Android ID: A-32377688.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | =4.0 | |
Android | =4.0.1 | |
Android | =4.0.2 | |
Android | =4.0.3 | |
Android | =4.0.4 | |
Android | =4.1 | |
Android | =4.1.2 | |
Android | =4.2 | |
Android | =4.2.1 | |
Android | =4.2.2 | |
Android | =4.3 | |
Android | =4.3.1 | |
Android | =4.4 | |
Android | =4.4.1 | |
Android | =4.4.2 | |
Android | =4.4.3 | |
Android | =4.4.4 | |
Android | =5.0 | |
Android | =5.0.1 | |
Android | =5.0.2 | |
Android | =5.1 | |
Android | =5.1.0 | |
Android | =5.1.1 | |
Android | =6.0 | |
Android | =6.0.1 | |
Android | =7.0 | |
Android | =7.1.0 | |
Android | ||
=4.0 | ||
=4.0.1 | ||
=4.0.2 | ||
=4.0.3 | ||
=4.0.4 | ||
=4.1 | ||
=4.1.2 | ||
=4.2 | ||
=4.2.1 | ||
=4.2.2 | ||
=4.3 | ||
=4.3.1 | ||
=4.4 | ||
=4.4.1 | ||
=4.4.2 | ||
=4.4.3 | ||
=4.4.4 | ||
=5.0 | ||
=5.0.1 | ||
=5.0.2 | ||
=5.1 | ||
=5.1.0 | ||
=5.1.1 | ||
=6.0 | ||
=6.0.1 | ||
=7.0 | ||
=7.1.0 |
https://android.googlesource.com/platform/frameworks/av/+/7a3246b870ddd11861eda2ab458b11d723c7f62c
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-0397 is rated as Moderate due to its potential to enable access to sensitive data without permission.
To fix CVE-2017-0397, update your Android device to a version that includes the security patch addressing this vulnerability.
CVE-2017-0397 affects various versions of Android starting from 4.0 up to 7.1.0.
An attacker exploiting CVE-2017-0397 may be able to access data outside of the application’s permitted access.
CVE-2017-0397 is a local attack vulnerability, requiring the attacker to have physical access to the device.