First published: Wed Nov 27 2024(Updated: )
In String16 of String16.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =6.0 | |
Google Android | =6.0.1 | |
Google Android | =7.0 | |
Google Android | =7.1.1 | |
Google Android | =7.1.2 | |
Google Android | =8.0 | |
Google Android | =8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-13323 has a severity level classified as high due to the potential for local privilege escalation.
To mitigate CVE-2017-13323, users should update their Android devices to the latest security patches provided by Google.
CVE-2017-13323 affects Android versions 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, and 8.1.
No, user interaction is not needed to exploit CVE-2017-13323, making it particularly concerning.
The potential impact of CVE-2017-13323 is an out of bounds write which can lead to local escalation of privilege in an unprivileged process.