{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T04:30:26.225","vulnerabilities":[{"cve":{"id":"CVE-2016-6767","sourceIdentifier":"security@android.com","published":"2017-01-12T15:59:00.543","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A denial of service vulnerability in Mediaserver could enable an attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service. Product: Android. Versions: 4.4.4. Android ID: A-31833604."},{"lang":"es","value":"Una vulnerabilidad de denegación de servicio en Mediaserver podría permitir a un atacante utilizar un archivo especialmente manipulado para provocar que un dispositivo se bloquee o reinicie. Este problema está calificado como High debido a la posibilidad de denegación remota de servicio. Producto: Android. Versiones: 4.4.4. Android ID: A-31833604."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:N/A:C","baseScore":7.1,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-399"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*","matchCriteriaId":"A39C31E3-75C0-4E92-A6B5-7D67B22E3449"},{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"BB318EA4-2908-4B91-8DBB-20008FDF528A"},{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*","matchCriteriaId":"1F4E46A9-B652-47CE-92E8-01021E57724B"},{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*","matchCriteriaId":"AB9B53C6-AE84-4A45-B83E-8E5CE44F7B93"},{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*","matchCriteriaId":"36DD8E3F-6308-4680-B932-4CBD8E58A7FB"},{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*","matchCriteriaId":"1DA9F0F7-D592-481E-884C-B1A94E702825"},{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"6CD857E7-B878-49F9-BDDA-93DDEBB0B42B"},{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*","matchCriteriaId":"FBDABB6C-FFF9-4E79-9EF1-BDC0BBDEA9F1"},{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*","matchCriteriaId":"A47AB858-36DE-4330-8CAC-1B46C5C8DA80"},{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*","matchCriteriaId":"49413FF7-7910-4F74-B106-C3170612CB2A"},{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*","matchCriteriaId":"A2467F65-A3B7-4E45-A9A5-E5A6EFD99D7B"},{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*","matchCriteriaId":"A8882E50-7C49-4A99-91F2-DF979CF8BB2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*","matchCriteriaId":"98C32982-095C-4628-9958-118A3D3A9CAA"},{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*","matchCriteriaId":"8FC0FCEA-0B3D-43C1-AB62-4F9C880B4CA1"},{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*","matchCriteriaId":"EC75ED04-B8C7-4CC0-AC64-AE2D9E0CDF5D"},{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*","matchCriteriaId":"FC13D3EE-CC89-4883-8E3D-3FE25FB8CF42"},{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*","matchCriteriaId":"E3CEEA22-63B4-4702-A400-01349DF0EC1E"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/94688","source":"security@android.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://source.android.com/security/bulletin/2016-12-01.html","source":"security@android.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/94688","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://source.android.com/security/bulletin/2016-12-01.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}