CVE-2017-13312
https://notcve.org/view.php?id=CVE-2017-13312
In createFromParcel of MediaCas.java, there is a possible parcel read/write mismatch due to improper input validation. This could lead to local escalation of privilege where an app can start an activity with system privileges with no additional execution privileges needed. User interaction is not needed for exploitation. • https://source.android.com/security/bulletin/2018-05-01 • CWE-276: Incorrect Default Permissions •
CVE-2017-13311
https://notcve.org/view.php?id=CVE-2017-13311
In the read() function of ProcessStats.java, there is a possible read/write serialization issue leading to a permissions bypass. This could lead to local escalation of privilege where an app can start an activity with system privileges with no additional execution privileges needed. User interaction is not needed for exploitation. • https://source.android.com/security/bulletin/2018-05-01 • CWE-276: Incorrect Default Permissions •
CVE-2017-13310
https://notcve.org/view.php?id=CVE-2017-13310
In createFromParcel of ViewPager.java, there is a possible read/write serialization issue leading to a permissions bypass. This could lead to local escalation of privilege where an app can start an activity with system privileges with no additional execution privileges needed. User interaction is not needed for exploitation. • https://source.android.com/security/bulletin/2018-05-01 • CWE-276: Incorrect Default Permissions •
CVE-2017-13309
https://notcve.org/view.php?id=CVE-2017-13309
In readEncryptedData of ConscryptEngine.java, there is a possible plaintext leak due to improperly used crypto. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. • https://source.android.com/security/bulletin/2018-05-01 •
CVE-2017-13227
https://notcve.org/view.php?id=CVE-2017-13227
In the autofill service, the package name that is provided by the app process is trusted inappropriately. This could lead to information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. • https://source.android.com/security/bulletin/2018-06-01 •