Lucene search

K
ubuntucveUbuntu.comUB:CVE-2017-0663
HistoryJun 14, 2017 - 12:00 a.m.

CVE-2017-0663

2017-06-1400:00:00
ubuntu.com
ubuntu.com
16

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.019 Low

EPSS

Percentile

88.4%

A remote code execution vulnerability in libxml2 could enable an attacker
using a specially crafted file to execute arbitrary code within the context
of an unprivileged process. This issue is rated as High due to the
possibility of remote code execution in an application that uses this
library. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0,
7.1.1, 7.1.2. Android ID: A-37104170.

Bugs

Notes

Author Note
tyhicks Downgrading from high to medium as the invalid write consists of a an enum member within a struct being written with a constant value that’s not attacker controlled. I suspect that this is quite difficult to exploit.
OSVersionArchitecturePackageVersionFilename
ubuntu14.04noarchlibxml2<Β 2.9.1+dfsg1-3ubuntu4.10UNKNOWN
ubuntu16.04noarchlibxml2<Β 2.9.3+dfsg1-1ubuntu0.3UNKNOWN
ubuntu17.04noarchlibxml2<Β 2.9.4+dfsg1-2.2ubuntu0.1UNKNOWN

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.019 Low

EPSS

Percentile

88.4%