First published: Mon Feb 06 2017(Updated: )
An elevation of privilege vulnerability in Audioserver could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32703959.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | =4.0 | |
Android | =4.0.1 | |
Android | =4.0.2 | |
Android | =4.0.3 | |
Android | =4.0.4 | |
Android | =4.1 | |
Android | =4.1.2 | |
Android | =4.2 | |
Android | =4.2.1 | |
Android | =4.2.2 | |
Android | =4.3 | |
Android | =4.3.1 | |
Android | =4.4 | |
Android | =4.4.1 | |
Android | =4.4.2 | |
Android | =4.4.3 | |
Android | =4.4.4 | |
Android | =5.0 | |
Android | =5.0.1 | |
Android | =5.0.2 | |
Android | =5.1 | |
Android | =5.1.0 | |
Android | =5.1.1 | |
Android | =6.0 | |
Android | =6.0.1 | |
Android | =7.0 | |
Android | =7.1.0 | |
Android | =7.1.1 | |
Android | ||
=4.0 | ||
=4.0.1 | ||
=4.0.2 | ||
=4.0.3 | ||
=4.0.4 | ||
=4.1 | ||
=4.1.2 | ||
=4.2 | ||
=4.2.1 | ||
=4.2.2 | ||
=4.3 | ||
=4.3.1 | ||
=4.4 | ||
=4.4.1 | ||
=4.4.2 | ||
=4.4.3 | ||
=4.4.4 | ||
=5.0 | ||
=5.0.1 | ||
=5.0.2 | ||
=5.1 | ||
=5.1.0 | ||
=5.1.1 | ||
=6.0 | ||
=6.0.1 | ||
=7.0 | ||
=7.1.0 | ||
=7.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-0418 is rated as High due to its potential for enabling a local malicious application to execute arbitrary code within a privileged process.
To mitigate CVE-2017-0418, ensure that you update your device's Android version to a patched release that addresses this vulnerability.
CVE-2017-0418 affects multiple versions of Android, specifically from 4.0 to 6.0.1.
CVE-2017-0418 is classified as an elevation of privilege vulnerability.
CVE-2017-0418 requires local access, meaning it cannot be exploited remotely without local access to the device.