First published: Mon Feb 06 2017(Updated: )
A remote code execution vulnerability in libstagefright could enable an attacker using a specially crafted file to execute arbitrary code in the context of an unprivileged process. This issue is rated as High due to the possibility of remote code execution in an application that uses this library. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-31999646.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | =6.0 | |
Android | =6.0.1 | |
Android | =7.0 | |
Android | =7.1.0 | |
Android | =7.1.1 | |
Android | ||
=6.0 | ||
=6.0.1 | ||
=7.0 | ||
=7.1.0 | ||
=7.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-0409 is rated as High due to its potential for remote code execution.
To fix CVE-2017-0409, update your Android device to the latest available security patch that addresses this vulnerability.
CVE-2017-0409 affects Android versions 6.0, 6.0.1, 7.0, 7.1.0, and 7.1.1.
Yes, CVE-2017-0409 can be exploited remotely if an attacker uses a specially crafted file.
The potential impact of CVE-2017-0409 is that it allows attackers to execute arbitrary code in the context of an unprivileged process.