In the read() function of ProcessStats.java, there is a possible read/write serialization issue leading to a permissions bypass. This could lead to local escalation of privilege where an app can start an activity with system privileges with no additional execution privileges needed. User interaction is not needed for exploitation.
References
Link | Resource |
---|---|
https://source.android.com/security/bulletin/2018-05-01 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
18 Dec 2024, 15:00
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.7 |
First Time |
Google android
|
|
CWE | NVD-CWE-noinfo | |
CPE | cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:* cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:* cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:* |
|
References | () https://source.android.com/security/bulletin/2018-05-01 - Vendor Advisory |
Information
Published : 2024-11-15 22:15
Updated : 2024-12-18 15:00
NVD link : CVE-2017-13311
Mitre link : CVE-2017-13311
CVE.ORG link : CVE-2017-13311
JSON object : View
Products Affected
- android
CWE