In the autofill service, the package name that is provided by the app process is trusted inappropriately. This could lead to information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://source.android.com/security/bulletin/2018-06-01 |
History
Wed, 20 Nov 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 19 Nov 2024 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Google
Google android |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:* |
|
Vendors & Products |
Google
Google android |
|
Metrics |
cvssV3_1
|
Thu, 14 Nov 2024 22:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the autofill service, the package name that is provided by the app process is trusted inappropriately. This could lead to information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: google_android
Published: 2024-11-14T22:10:59.404Z
Updated: 2024-11-20T16:20:55.951Z
Reserved: 2017-08-23T00:00:00.000Z
Link: CVE-2017-13227
Vulnrichment
Updated: 2024-11-20T16:20:27.323Z
NVD
Status : Modified
Published: 2024-11-14T23:15:05.013
Modified: 2024-11-20T17:35:01.323
Link: CVE-2017-13227
Redhat
No data.