In writeInplace of Parcel.cpp, there is a possible information leak across processes, using Binder, due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
History

Fri, 22 Nov 2024 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Google
Google android
CPEs cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*
cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*
cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*
Vendors & Products Google
Google android

Wed, 20 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-908
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 19 Nov 2024 21:30:00 +0000

Type Values Removed Values Added
Description In writeInplace of Parcel.cpp, there is a possible information leak across processes, using Binder, due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: google_android

Published: 2024-11-19T21:22:12.436Z

Updated: 2024-11-20T15:34:27.270Z

Reserved: 2018-04-05T00:00:00.000Z

Link: CVE-2018-9421

cve-icon Vulnrichment

Updated: 2024-11-20T15:34:19.387Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-19T22:15:19.070

Modified: 2024-11-22T22:05:41.297

Link: CVE-2018-9421

cve-icon Redhat

No data.