CVE-2017-0465

An elevation of privilege vulnerability in the Qualcomm ADSPRPC driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34112914. References: QC-CR#1110747.
References
Link Resource
http://www.securityfocus.com/bid/98184 Third Party Advisory VDB Entry
https://source.android.com/security/bulletin/2017-05-01 Patch Vendor Advisory
http://www.securityfocus.com/bid/98184 Third Party Advisory VDB Entry
https://source.android.com/security/bulletin/2017-05-01 Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.18:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:google:android:*:*:*:*:*:*:*:*

History

21 Nov 2024, 03:03

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/98184 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/98184 - Third Party Advisory, VDB Entry
References () https://source.android.com/security/bulletin/2017-05-01 - Patch, Vendor Advisory () https://source.android.com/security/bulletin/2017-05-01 - Patch, Vendor Advisory

Information

Published : 2017-05-12 15:29

Updated : 2024-11-21 03:03


NVD link : CVE-2017-0465

Mitre link : CVE-2017-0465

CVE.ORG link : CVE-2017-0465


JSON object : View

Products Affected

linux

  • linux_kernel

google

  • android
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')