In writeToParcel and createFromParcel of DcParamObject.java, there is a permission bypass due to a write size mismatch. This could lead to an elevation of privileges where the user can start an activity with system privileges, with no additional execution privileges needed. User interaction is not needed for exploitation.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://source.android.com/security/bulletin/2018-05-01 |
![]() ![]() |
History
Wed, 18 Dec 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Google
Google android |
|
CPEs | cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:* cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:* cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:* cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:* |
|
Vendors & Products |
Google
Google android |
Wed, 20 Nov 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
F5
F5 access For Android |
|
Weaknesses | CWE-131 | |
CPEs | cpe:2.3:a:f5:access_for_android:*:*:*:*:*:*:*:* | |
Vendors & Products |
F5
F5 access For Android |
|
Metrics |
cvssV3_1
|
Tue, 19 Nov 2024 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In writeToParcel and createFromParcel of DcParamObject.java, there is a permission bypass due to a write size mismatch. This could lead to an elevation of privileges where the user can start an activity with system privileges, with no additional execution privileges needed. User interaction is not needed for exploitation. | |
References |
|

Status: PUBLISHED
Assigner: google_android
Published:
Updated: 2024-11-20T16:39:43.948Z
Reserved: 2017-08-23T00:00:00.000Z
Link: CVE-2017-13315

Updated: 2024-11-20T16:37:01.459Z

Status : Analyzed
Published: 2024-11-19T18:15:18.613
Modified: 2024-12-18T14:23:37.877
Link: CVE-2017-13315

No data.