7.8
CVSSv3

CVE-2017-13216

Published: 12/01/2018 Updated: 30/01/2018
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 725
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

In ashmem_ioctl of ashmem.c, there is an out-of-bounds write due to insufficient locking when accessing asma. This could lead to a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-66954097.

Vulnerable Product Search on Vulmon Subscribe to Product

google android -

Vendor Advisories

In ashmem_ioctl of ashmemc, there is an out-of-bounds write due to insufficient locking when accessing asma This could lead to a local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed User interaction is not needed for exploitation Product: Android Versions: Android kernel A ...

Exploits

The MemoryIntArray class allows processes to share an in-memory array of integers backed by an "ashmem" file descriptor As the class implements the Parcelable interface, it can be inserted into a Parcel, and optionally placed in a Bundle and transferred via binder to remote processes Instead of directly tracking the size of the shared memory reg ...