In the autofill service, the package name that is provided by the app process is trusted inappropriately. This could lead to information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://source.android.com/security/bulletin/2018-06-01 |
![]() ![]() |
History
Wed, 20 Nov 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 19 Nov 2024 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Google
Google android |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:* |
|
Vendors & Products |
Google
Google android |
|
Metrics |
cvssV3_1
|
Thu, 14 Nov 2024 22:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In the autofill service, the package name that is provided by the app process is trusted inappropriately. This could lead to information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | |
References |
|

Status: PUBLISHED
Assigner: google_android
Published:
Updated: 2024-11-20T16:20:55.951Z
Reserved: 2017-08-23T00:00:00.000Z
Link: CVE-2017-13227

Updated: 2024-11-20T16:20:27.323Z

Status : Modified
Published: 2024-11-14T23:15:05.013
Modified: 2024-11-20T17:35:01.323
Link: CVE-2017-13227

No data.