ID

VAR-201701-0683


CVE

CVE-2017-5217


TITLE

specific Samsung Android Device software Android OS of system_server Service disruption in the process (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2017-001051

DESCRIPTION

Installing a zero-permission Android application on certain Samsung Android devices with KK(4.4), L(5.0/5.1), and M(6.0) software can continually crash the system_server process in the Android OS. The zero-permission app will create an active install session for a separate app that it has embedded within it. The active install session of the embedded app is performed using the android.content.pm.PackageInstaller class and its nested classes in the Android API. The active install session will write the embedded APK file to the /data/app directory, but the app will not be installed since third-party applications cannot programmatically install apps. Samsung has modified AOSP in order to accelerate the parsing of APKs by introducing the com.android.server.pm.PackagePrefetcher class and its nested classes. These classes will parse the APKs present in the /data/app directory and other directories, even if the app is not actually installed. The embedded APK that was written to the /data/app directory via the active install session has a very large but valid AndroidManifest.xml file. Specifically, the AndroidManifest.xml file contains a very large string value for the name of a permission-tree that it declares. When system_server tries to parse the APK file of the embedded app from the active install session, it will crash due to an uncaught error (i.e., java.lang.OutOfMemoryError) or an uncaught exception (i.e., std::bad_alloc) because of memory constraints. The Samsung Android device will encounter a soft reboot due to a system_server crash, and this action will keep repeating since parsing the APKs in the /data/app directory as performed by the system_server process is part of the normal boot process. The Samsung ID is SVE-2016-6917. Vendors have confirmed this vulnerability SVE-2016-6917 It is released as.No permission (zero-permission) Android Service installation disruption by installing applications ( Continuous crash ) There is a possibility of being put into a state. SamsungAndroid is a series of Android smartphones from South Korea's Samsung. There is a security hole in the SamsungAndroid device. An attacker could exploit the vulnerability with a specially crafted resource profile to cause a system crash that could result in a denial of service. Multiple Samsung Android Mobile Phones are prone to a denial-of-service vulnerability. An attacker can exploit this issue to factory reset the device, resulting in denial-of-service conditions

Trust: 2.43

sources: NVD: CVE-2017-5217 // JVNDB: JVNDB-2017-001051 // CNVD: CNVD-2017-00455 // BID: 95319

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-00455

AFFECTED PRODUCTS

vendor:samsungmodel:mobilescope:eqversion:6.0

Trust: 1.6

vendor:samsungmodel:mobilescope:eqversion:5.1

Trust: 1.6

vendor:samsungmodel:mobilescope:eqversion:4.4

Trust: 1.6

vendor:samsungmodel:mobilescope:eqversion:5.0

Trust: 1.6

vendor:samsungmodel:mobilescope: - version: -

Trust: 0.8

vendor:samsungmodel:mobile phonesscope:eqversion:4.4

Trust: 0.6

vendor:samsungmodel:mobile phonesscope:eqversion:5.0

Trust: 0.6

vendor:samsungmodel:mobile phonesscope:eqversion:5.1

Trust: 0.6

vendor:samsungmodel:mobile phonesscope:eqversion:6.0

Trust: 0.6

vendor:googlemodel:androidscope:eqversion:5.1.1

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:5.0.2

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:5.0.1

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:4.4.4

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:4.4.3

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:4.4.2

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:4.4.1

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:6.0

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:5.1

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:5.0

Trust: 0.3

vendor:googlemodel:androidscope:eqversion:4.4

Trust: 0.3

sources: CNVD: CNVD-2017-00455 // BID: 95319 // JVNDB: JVNDB-2017-001051 // CNNVD: CNNVD-201701-160 // NVD: CVE-2017-5217

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-5217
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-5217
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2017-00455
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201701-160
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2017-5217
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-00455
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2017-5217
baseSeverity: MEDIUM
baseScore: 5.5
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2017-00455 // JVNDB: JVNDB-2017-001051 // CNNVD: CNNVD-201701-160 // NVD: CVE-2017-5217

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.8

problemtype:CWE-20

Trust: 1.8

sources: JVNDB: JVNDB-2017-001051 // NVD: CVE-2017-5217

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201701-160

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201701-160

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-001051

PATCH

title:SVE-2016-6917: Forcing factory resets with a large manifest file on Samsung Android Devicesurl:http://security.samsungmobile.com/smrupdate.html#SMR-JAN-2017

Trust: 0.8

title:Patches for multiple Samsung Android MobilePhones denial of service vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/88003

Trust: 0.6

title:Samsung Android Repair measures for device security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=66888

Trust: 0.6

sources: CNVD: CNVD-2017-00455 // JVNDB: JVNDB-2017-001051 // CNNVD: CNNVD-201701-160

EXTERNAL IDS

db:NVDid:CVE-2017-5217

Trust: 3.3

db:BIDid:95319

Trust: 2.7

db:JVNDBid:JVNDB-2017-001051

Trust: 0.8

db:CNVDid:CNVD-2017-00455

Trust: 0.6

db:CNNVDid:CNNVD-201701-160

Trust: 0.6

sources: CNVD: CNVD-2017-00455 // BID: 95319 // JVNDB: JVNDB-2017-001051 // CNNVD: CNNVD-201701-160 // NVD: CVE-2017-5217

REFERENCES

url:http://security.samsungmobile.com/smrupdate.html#smr-jan-2017

Trust: 1.9

url:http://www.securityfocus.com/bid/95319

Trust: 1.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5217

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2017-5217

Trust: 0.8

url:http://security.samsungmobile.com/smrupdate.html#smr

Trust: 0.6

url:http://www.samsung.com/

Trust: 0.3

sources: CNVD: CNVD-2017-00455 // BID: 95319 // JVNDB: JVNDB-2017-001051 // CNNVD: CNNVD-201701-160 // NVD: CVE-2017-5217

CREDITS

Ryan Johnson and Angelos Stavrou of Kryptowire.

Trust: 0.3

sources: BID: 95319

SOURCES

db:CNVDid:CNVD-2017-00455
db:BIDid:95319
db:JVNDBid:JVNDB-2017-001051
db:CNNVDid:CNNVD-201701-160
db:NVDid:CVE-2017-5217

LAST UPDATE DATE

2024-11-23T22:01:19.795000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-00455date:2017-01-16T00:00:00
db:BIDid:95319date:2017-01-12T01:10:00
db:JVNDBid:JVNDB-2017-001051date:2017-01-17T00:00:00
db:CNNVDid:CNNVD-201701-160date:2017-01-12T00:00:00
db:NVDid:CVE-2017-5217date:2024-11-21T03:27:18.367

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-00455date:2017-01-16T00:00:00
db:BIDid:95319date:2017-01-09T00:00:00
db:JVNDBid:JVNDB-2017-001051date:2017-01-17T00:00:00
db:CNNVDid:CNNVD-201701-160date:2017-01-10T00:00:00
db:NVDid:CVE-2017-5217date:2017-01-09T08:59:00.247