Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution

ITS Advisory Number: 
2017-033
Date(s) Issued: 
Wednesday, April 5, 2017
Subject: 
Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution
Overview: 

Multiple vulnerabilities have been discovered in the Google Android operating system (OS), the most severe of which could allow for remote code execution. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. These vulnerabilities could be exploited through multiple methods such as email, web browsing, and MMS when processing media files. Successful exploitation of the most severe of these vulnerabilities could result in remote code execution in the context of the application. Depending on the privileges associated with this application, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. If this application has been configured to have fewer user rights on the system, exploitation of the most severe of these vulnerabilities could have less impact than if it was configured with administrative rights.

Systems Affected: 

Android OS builds utilizing Security Patch Levels prior to April 5, 2017

RISK
GOVERNMENT
Large and medium government entities: 
High
Small government entities: 
High
BUSINESS
Large and medium business entities: 
High
Small business entities: 
High
Home Users: 
High
Description: 

Multiple vulnerabilities have been discovered in the Google Android OS, the most severe of which could allow for remote code execution. The vulnerabilities are as follows:

  • Remote code execution vulnerability in Mediaserver (CVE-2017-0538, CVE-2017-0539, CVE-2017-0540, CVE-2017-0541, CVE-2017-0542, CVE-2017-0543)
  • Elevation of privilege vulnerability in CameraBase (CVE-2017-0544)
  • Elevation of privilege vulnerability in Audioserver (CVE-2017-0545)
  • Elevation of privilege vulnerability in SurfaceFlinger (CVE-2017-0546)
  • Information disclosure vulnerability in Mediaserver (CVE-2017-0547)
  • Denial of service vulnerability in libskia (CVE-2017-0548)
  • Denial of service vulnerability in Mediaserver (CVE-2017-0549, CVE-2017-0550, CVE-2017-0551, CVE-2017-0552)
  • Elevation of privilege vulnerability in libnl (CVE-2017-0553)
  • Elevation of privilege vulnerability in Telephony (CVE-2017-0554)
  • Information disclosure vulnerability in Mediaserver (CVE-2017-0555, CVE-2017-0556, CVE-2017-0557, CVE-2017-0558)
  • Information disclosure vulnerability in libskia (CVE-2017-0559)
  • Information disclosure vulnerability in Factory Reset (CVE-2017-0560)
  • Remote code execution vulnerability in Broadcom Wi-Fi firmware (CVE-2017-0561)
  • Remote code execution vulnerability in Qualcomm crypto engine driver (CVE-2016-10230)
  • Remote code execution vulnerability in kernel networking subsystem (CVE-2016-10229)
  • Elevation of privilege vulnerability in MediaTek touchscreen driver (CVE-2017-0562)
  • Elevation of privilege vulnerability in HTC touchscreen driver (CVE-2017-0563)
  • Elevation of privilege vulnerability in kernel ION subsystem (CVE-2017-0564)
  • Vulnerabilities in Qualcomm components (CVE-2016-10237, CVE-2016-10238, CVE-2016-10239)
  • Remote code execution vulnerability in v8 (CVE-2016-5129)
  • Remote code execution vulnerability in Freetype (CVE-2016-10244)
  • Elevation of privilege vulnerability in kernel sound subsystem (CVE-2014-4656)
  • Elevation of privilege vulnerability in NVIDIA crypto driver (CVE-2017-0339, CVE-2017-0332, CVE-2017-0327)
  • Elevation of privilege vulnerability in MediaTek thermal driver (CVE-2017-0565)
  • Elevation of privilege vulnerability in MediaTek camera driver (CVE-2017-0566)
  • Elevation of privilege vulnerability in Broadcom Wi-Fi driver (CVE-2017-0567, CVE-2017-0568, CVE-2017-0569, CVE-2017-0570, CVE-2017-0571, CVE-2017-0572, CVE-2017-0573, CVE-2017-0574)
  • Elevation of privilege vulnerability in Qualcomm Wi-Fi driver (CVE-2017-0575)
  • Elevation of privilege vulnerability in NVIDIA I2C HID driver (CVE-2017-0325)
  • Elevation of privilege vulnerability in Qualcomm audio driver (CVE-2017-0454)
  • Elevation of privilege vulnerability in Qualcomm crypto engine driver (CVE-2017-0576)
  • Elevation of privilege vulnerability in HTC touchscreen driver (CVE-2017-0577)
  • Elevation of privilege vulnerability in DTS sound driver (CVE-2017-0578)
  • Elevation of privilege vulnerability in Qualcomm sound codec driver (CVE-2016-10231)
  • Elevation of privilege vulnerability in Qualcomm video driver (CVE-2017-0579, CVE-2016-10232, CVE-2016-10233)
  • Elevation of privilege vulnerability in NVIDIA boot and power management processor driver (CVE-2017-0329)
  • Elevation of privilege vulnerability in Synaptics touchscreen driver (CVE-2017-0580, CVE-2017-0581)
  • Elevation of privilege vulnerability in Qualcomm Seemp driver (CVE-2017-0462)
  • Elevation of privilege vulnerability in Qualcomm Kyro L2 driver (CVE-2017-6423)
  • Elevation of privilege vulnerability in kernel file system (CVE-2014-9922)
  • Information disclosure vulnerability in kernel memory subsystem (CVE-2014-0206)
  • Information disclosure vulnerability in kernel networking subsystem (CVE-2014-3145)
  • Information disclosure vulnerability in Qualcomm TrustZone (CVE-2016-5349)
  • Information disclosure vulnerability in Qualcomm IPA driver (CVE-2016-10234)
  • Denial of service vulnerability in kernel networking subsystem (CVE-2014-2706)
  • Denial of service vulnerability in Qualcomm Wi-Fi driver (CVE-2016-10235)
  • Elevation of privilege vulnerability in kernel file system (CVE-2016-7097)
  • Elevation of privilege vulnerability in Qualcomm Wi-Fi driver (CVE-2017-6424)
  • Elevation of privilege vulnerability in Broadcom Wi-Fi driver (CVE-2016-8465)
  • Elevation of privilege vulnerability in HTC OEM fastboot command (CVE-2017-0582)
  • Elevation of privilege vulnerability in Qualcomm CP access driver (CVE-2017-0583)
  • Information disclosure vulnerability in kernel media driver (CVE-2014-1739)
  • Information disclosure vulnerability in Qualcomm Wi-Fi driver (CVE-2017-0584)
  • Information disclosure vulnerability in Broadcom Wi-Fi driver (CVE-2017-0585)
  • Information disclosure vulnerability in Qualcomm Avtimer driver (CVE-2016-5346)
  • Information disclosure vulnerability in Qualcomm video driver (CVE-2017-6425)
  • Information disclosure vulnerability in Qualcomm USB driver (CVE-2016-10236)
  • Information disclosure vulnerability in Qualcomm sound driver (CVE-2017-0586)
  • Information disclosure vulnerability in Qualcomm SPMI driver (CVE-2017-6426)
  • Information disclosure vulnerability in NVIDIA crypto driver (CVE-2017-0328, CVE-2017-0330)
  • Vulnerabilities in Qualcomm components (CVE-2014-9931, CVE-2014-9932, CVE-2014-9933, CVE-2014-9934, CVE-2014-9935, CVE-2014-9936, CVE-2014-9937, CVE-2015-8995, CVE-2015-8996, CVE-2015-8997, CVE-2015-8998, CVE-2015-8999, CVE-2015-9000, CVE-2015-9001, CVE-2015-9002, CVE-2015-9003, CVE-2016-8489)

Successful exploitation of the most severe of these vulnerabilities could result in remote code execution in the context of the application. Depending on the privileges associated with this application, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. If this application has been configured to have fewer user rights on the system, exploitation of the most severe of these vulnerabilities could have less impact than if it was configured with administrative rights.

Actions: 
  • After appropriate testing, immediately apply updates provided by Google Android or mobile carriers to vulnerable systems.
  • Remind users to download apps only from trusted vendors in the Play Store.
  • Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources.
  • Inform and educate users regarding the threats posed by hypertext links contained in emails or attachments especially from un-trusted sources.
References: 

Google:

https://source.android.com/security/bulletin/2017-04-01.html

CVE:

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0206

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1739

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2706

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3145

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4656

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9922

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9931

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9932

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9933

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9934

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9935

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9936

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9937

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8995

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8996

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8997

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8998

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8999

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9000

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9001

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9002

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9003

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10229

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10230

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10231

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10232

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10233

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10234

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10235

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10236

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10237

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10238

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10239

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10244

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5129

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5346

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5349

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7097

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8465

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8489

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0325

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0327

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0328

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0329

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0330

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0332

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0339

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0454

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0462

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0538

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0539

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0540

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0541

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0542

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0543

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0544

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0545

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0546

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0547

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0548

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0549

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0550

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0551

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0552

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0553

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0554

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0555

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0556

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0557

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0558

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0559

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0560

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0561

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0562

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0563

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0564

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0565

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0566

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0567

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0568

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0569

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0570

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0571

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0572

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0573

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0574

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0575

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0576

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0577

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0578

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0579

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0580

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0581

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0582

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0583

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0584

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0585

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0586

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6423

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6424

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6425

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6426