In writeToParcel and createFromParcel of DcParamObject.java, there is a permission bypass due to a write size mismatch. This could lead to an elevation of privileges where the user can start an activity with system privileges, with no additional execution privileges needed. User interaction is not needed for exploitation.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://source.android.com/security/bulletin/2018-05-01 |
History
Wed, 20 Nov 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
F5
F5 access For Android |
|
Weaknesses | CWE-131 | |
CPEs | cpe:2.3:a:f5:access_for_android:*:*:*:*:*:*:*:* | |
Vendors & Products |
F5
F5 access For Android |
|
Metrics |
cvssV3_1
|
Tue, 19 Nov 2024 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In writeToParcel and createFromParcel of DcParamObject.java, there is a permission bypass due to a write size mismatch. This could lead to an elevation of privileges where the user can start an activity with system privileges, with no additional execution privileges needed. User interaction is not needed for exploitation. | |
References |
|
MITRE
Status: PUBLISHED
Assigner: google_android
Published: 2024-11-19T17:50:22.454Z
Updated: 2024-11-20T16:39:43.948Z
Reserved: 2017-08-23T00:00:00.000Z
Link: CVE-2017-13315
Vulnrichment
Updated: 2024-11-20T16:37:01.459Z
NVD
Status : Awaiting Analysis
Published: 2024-11-19T18:15:18.613
Modified: 2024-11-20T17:35:01.990
Link: CVE-2017-13315
Redhat
No data.