{"id":"UBUNTU-CVE-2016-6762","details":"An elevation of privilege vulnerability in the libziparchive library could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0. Android ID: A-31251826.","modified":"2026-04-22T10:54:39.422741Z","published":"2017-01-12T15:59:00Z","upstream":["CVE-2016-6762"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2016-6762"},{"type":"REPORT","url":"https://source.android.com/security/bulletin/2016-12-01.html"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2016-6762"}],"affected":[{"package":{"name":"android-platform-system-core","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/android-platform-system-core@1:6.0.1+r16-3?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["21-6","1:6.0.0+r26-1","1:6.0.1+r16-1","1:6.0.1+r16-3"],"ecosystem_specific":{"binaries":[{"binary_version":"1:6.0.1+r16-3","binary_name":"adb"},{"binary_version":"1:6.0.1+r16-3","binary_name":"android-libadb"},{"binary_version":"1:6.0.1+r16-3","binary_name":"android-libbacktrace"},{"binary_version":"1:6.0.1+r16-3","binary_name":"android-libbase"},{"binary_version":"1:6.0.1+r16-3","binary_name":"android-libcutils"},{"binary_version":"1:6.0.1+r16-3","binary_name":"android-liblog"},{"binary_version":"1:6.0.1+r16-3","binary_name":"android-libsparse"},{"binary_version":"1:6.0.1+r16-3","binary_name":"android-libutils"},{"binary_version":"1:6.0.1+r16-3","binary_name":"android-libziparchive"},{"binary_version":"1:6.0.1+r16-3","binary_name":"android-libzipfile"},{"binary_version":"1:6.0.1+r16-3","binary_name":"android-platform-system-core-headers"},{"binary_version":"1:6.0.1+r16-3","binary_name":"fastboot"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-6762.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}