Government of the Republic of Trinidad and Tobago
gov.tt

TTCSIRT-059.110917: TT-CSIRT Advisory – Android Security Updates

TTCSIRT-059.110917: TT-CSIRT Advisory – Android Security Updates

Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for arbitrary code execution within the context of a privileged process. Details of these vulnerabilities are as follows:

a) Multiple elevation of privilege vulnerabilities in Framework – (CVE-2017-0830, CVE-2017-0831)

b) Multiple arbitrary code execution vulnerabilities in Media Framework – (CVE-2017-0832, CVE-2017-0833, CVE-2017-0834, CVE-2017-0835, CVE-2017-0836)

c) Multiple information disclosure vulnerabilities in Media Framework – (CVE-2017-0839, CVE-2017-0840)

d) An arbitrary code execution vulnerability in System – (CVE-2017-0841)

e) An elevation of privilege vulnerability in System – (CVE-2017-0842)

f) Multiple elevation of privilege vulnerabilities in Kernal components – (CVE-2017-9077, CVE-2017-7541)

g) An elevation of privilege vulnerability in MediaTek components – (CVE-2017-0843)

h) An elevation of privilege vulnerability in NVIDIA components – (CVE-2017-6264)

i) Multiple arbitrary code execution vulnerabilities in Qualcomm components – (CVE-2017-11013, CVE-2017-11015, CVE-2017-11014)

j) Multiple elevation of privilege vulnerabilities in Qualcomm components – (CVE-2017-11092, CVE-2017-9690, CVE-2017-11017)

k) An information disclosure vulnerability in Qualcomm components – (CVE-2017-11028)

l) Multiple elevation of privilege vulnerabilities in System – (CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2017-13081, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088)

Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of a privileged process. These vulnerabilities could be exploited through multiple methods such as email, web browsing, and MMS when processing media files. Depending on the privileges associated with the application, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. If this application has been configured to have fewer user rights on the system, exploitation of the most severe of these vulnerabilities could have less impact than if it was configured with administrative rights.

Further information on these vulnerabilities and how they can be fixed can be found at https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-google-chrome-could-allow-for-arbitrary-code-execution_2017-108/