#VU40029 Permissions, Privileges, and Access Controls in Google Android - CVE-2016-6707


| Updated: 2020-08-09

Vulnerability identifier: #VU40029

Vulnerability risk: High

CVSSv4.0: 7.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Amber]

CVE-ID: CVE-2016-6707

CWE-ID: CWE-264

Exploitation vector: Network

Exploit availability: Yes

Vulnerable software:
Google Android
Operating systems & Components / Operating system

Vendor: Google

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

An elevation of privilege vulnerability in System Server in Android 6.x before 2016-11-01 and 7.0 before 2016-11-01 could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Android ID: A-31350622.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Google Android: 7.0


External links
https://www.securityfocus.com/bid/94164
https://bugs.chromium.org/p/project-zero/issues/detail?id=928
https://googleprojectzero.blogspot.com/2016/12/bitunmap-attacking-android-ashmem.html
https://source.android.com/security/bulletin/2016-11-01.html
https://www.exploit-db.com/exploits/40874/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability