First published: Mon Feb 06 2017(Updated: )
An information disclosure vulnerability in AOSP Messaging could enable a remote attacker using a special crafted file to access data outside of its permission levels. This issue is rated as Moderate because it is a general bypass for a user level defense in depth or exploit mitigation technology in a privileged process. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32322450.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | =6.0 | |
Android | =6.0.1 | |
Android | =7.0 | |
Android | =7.1.0 | |
Android | =7.1.1 | |
Android | ||
=6.0 | ||
=6.0.1 | ||
=7.0 | ||
=7.1.0 | ||
=7.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-0424 is rated as Moderate due to its capability to bypass user-level defense mechanisms.
To fix CVE-2017-0424, users should update their Android devices to the latest security patch provided by Google.
CVE-2017-0424 affects Android versions 6.0, 6.0.1, 7.0, 7.1.0, and 7.1.1.
CVE-2017-0424 is an information disclosure vulnerability in AOSP Messaging.
Yes, CVE-2017-0424 can be exploited by a remote attacker using a specially crafted file.