UBUNTU-CVE-2017-0471

Source
https://ubuntu.com/security/CVE-2017-0471
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-0471.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2017-0471
Upstream
  • CVE-2017-0471
Published
2017-03-08T01:59:00Z
Modified
2025-10-24T04:46:02Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

A remote code execution vulnerability in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-33816782.

References

Affected packages

Ubuntu:16.04:LTS / android

Package

Name
android
Purl
pkg:deb/ubuntu/android@20160330-0939-0ubuntu1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

Other
20150818-1500-0ubuntu2
20150818-1500-0ubuntu3
20160307-0742-0ubuntu3
20160330-0939-0ubuntu1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "20160330-0939-0ubuntu1",
            "binary_name": "android"
        },
        {
            "binary_version": "20160330-0939-0ubuntu1",
            "binary_name": "android-copyright"
        },
        {
            "binary_version": "20160330-0939-0ubuntu1",
            "binary_name": "android-emulator"
        },
        {
            "binary_version": "20160330-0939-0ubuntu1",
            "binary_name": "ubuntu-emulator-images"
        },
        {
            "binary_version": "20160330-0939-0ubuntu1",
            "binary_name": "ubuntu-emulator-runtime"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-0471.json"