In the read() function of ProcessStats.java, there is a possible read/write serialization issue leading to a permissions bypass. This could lead to local escalation of privilege where an app can start an activity with system privileges with no additional execution privileges needed. User interaction is not needed for exploitation.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://source.android.com/security/bulletin/2018-05-01 |
History
Wed, 18 Dec 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:* cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:* cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:* |
Tue, 19 Nov 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Google
Google android |
|
Weaknesses | CWE-276 | |
CPEs | cpe:2.3:o:google:android:-:*:*:*:*:*:*:* | |
Vendors & Products |
Google
Google android |
|
Metrics |
cvssV3_1
|
Fri, 15 Nov 2024 22:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the read() function of ProcessStats.java, there is a possible read/write serialization issue leading to a permissions bypass. This could lead to local escalation of privilege where an app can start an activity with system privileges with no additional execution privileges needed. User interaction is not needed for exploitation. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: google_android
Published: 2024-11-15T21:46:33.040Z
Updated: 2024-11-19T16:13:02.674Z
Reserved: 2017-08-23T00:00:00.000Z
Link: CVE-2017-13311
Vulnrichment
Updated: 2024-11-19T16:12:52.135Z
NVD
Status : Analyzed
Published: 2024-11-15T22:15:14.240
Modified: 2024-12-18T15:00:52.703
Link: CVE-2017-13311
Redhat
No data.