In the read() function of ProcessStats.java, there is a possible read/write serialization issue leading to a permissions bypass. This could lead to local escalation of privilege where an app can start an activity with system privileges with no additional execution privileges needed. User interaction is not needed for exploitation.
History

Wed, 18 Dec 2024 15:30:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*
cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*

Tue, 19 Nov 2024 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google android
Weaknesses CWE-276
CPEs cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
Vendors & Products Google
Google android
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 15 Nov 2024 22:00:00 +0000

Type Values Removed Values Added
Description In the read() function of ProcessStats.java, there is a possible read/write serialization issue leading to a permissions bypass. This could lead to local escalation of privilege where an app can start an activity with system privileges with no additional execution privileges needed. User interaction is not needed for exploitation.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: google_android

Published: 2024-11-15T21:46:33.040Z

Updated: 2024-11-19T16:13:02.674Z

Reserved: 2017-08-23T00:00:00.000Z

Link: CVE-2017-13311

cve-icon Vulnrichment

Updated: 2024-11-19T16:12:52.135Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-15T22:15:14.240

Modified: 2024-12-18T15:00:52.703

Link: CVE-2017-13311

cve-icon Redhat

No data.