First published: Mon Mar 05 2018(Updated: )
In impeg2d_dec_pic_data_thread of impeg2d_dec_hdr.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege when running multi threaded with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-69269702.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Google Android | =6.0 | |
Google Android | =6.0.1 | |
Google Android | =7.0 | |
Google Android | =7.1.1 | |
Google Android | =7.1.2 | |
Google Android | =8.0 | |
Google Android | =8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-13251 has a moderate severity level due to its potential for local escalation of privilege.
To fix CVE-2017-13251, update affected Android devices to the latest security patch provided by Google.
CVE-2017-13251 affects Android versions 6.0 through 8.1.
Yes, user interaction is required to exploit CVE-2017-13251.
CVE-2017-13251 is primarily related to the impeg2d_dec_pic_data_thread in the impeg2d_dec_hdr.c component.