7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.003 Low
EPSS
Percentile
71.3%
A remote code execution vulnerability in libjpeg in Android 4.x before
4.4.4, 5.0.x before 5.0.2, and 5.1.x before 5.1.1 could enable an attacker
using a specially crafted file to execute arbitrary code in the context of
an unprivileged process. This issue is rated as High due to the possibility
of remote code execution in an application that uses libjpeg. Android ID:
A-30259087.
Author | Note |
---|---|
jdstrand | libjpeg on android. chromium-browser uses system libjpeg |
mdeslaur | PoC is here: https://github.com/ele7enxxh/poc-exp/tree/master/CVE-2016-6702 libjpeg-turbo in Debian/Ubuntu has a stub for jpeg_open_backing_store this is an issue in the android ashmem backing store |
github.com/android-security/android_external_jpeg/commit/19a6799932f7468f24c972f9acfc314ebbfc9ab2
launchpad.net/bugs/cve/CVE-2016-6702
nvd.nist.gov/vuln/detail/CVE-2016-6702
security-tracker.debian.org/tracker/CVE-2016-6702
source.android.com/security/bulletin/2016-11-01.html
www.cve.org/CVERecord?id=CVE-2016-6702
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.003 Low
EPSS
Percentile
71.3%