First published: Mon May 07 2018(Updated: )
In writeToParcel and createFromParcel of DcParamObject.java, there is a permission bypass due to a write size mismatch. This could lead to an elevation of privileges where the user can start an activity with system privileges, with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Google Android | =6.0 | |
Google Android | =6.0.1 | |
Google Android | =7.0 | |
Google Android | =7.1.1 | |
Google Android | =7.1.2 | |
Google Android | =8.0 | |
Google Android | =8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-13315 has been rated as a moderate severity vulnerability that can lead to privilege escalation.
To fix CVE-2017-13315, update your Google Android system to the latest version where the vulnerability has been patched.
CVE-2017-13315 affects Android versions 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, and 8.1.
CVE-2017-13315 is a permission bypass vulnerability that can allow unauthorized elevation of privileges.
No, CVE-2017-13315 does not require user interaction to exploit.