An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.
http://rhn.redhat.com/errata/RHSA-2017-0817.html
http://www.securityfocus.com/bid/94708
https://access.redhat.com/errata/RHSA-2017:0869
https://access.redhat.com/errata/RHSA-2017:2930
https://access.redhat.com/errata/RHSA-2017:2931
https://source.android.com/security/bulletin/2016-12-01.html
https://support.f5.com/csp/article/K23030550?utm_source=f5support&utm_medium=RSS
Source: MITRE
Published: 2017-01-12
Updated: 2018-01-05
Type: CWE-284
Base Score: 7.6
Vector: AV:N/AC:H/Au:N/C:C/I:C/A:C
Impact Score: 10
Exploitability Score: 4.9
Severity: HIGH
Base Score: 7
Vector: CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 1
Severity: HIGH