{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T05:25:14.241","vulnerabilities":[{"cve":{"id":"CVE-2017-13313","sourceIdentifier":"security@android.com","published":"2024-11-15T22:15:14.373","lastModified":"2024-12-18T14:44:13.577","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"In ElementaryStreamQueue::dequeueAccessUnitMPEG4Video of ESQueue.cpp, there is a possible infinite loop leading to resource exhaustion due to an incorrect bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation."},{"lang":"es","value":"En ElementaryStreamQueue::dequeueAccessUnitMPEG4Video de ESQueue.cpp, existe un posible bucle infinito que conduce al agotamiento de los recursos debido a una comprobación incorrecta de los límites. Esto podría provocar una denegación de servicio remota sin necesidad de privilegios de ejecución adicionales. Se necesita la interacción del usuario para la explotación."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-835"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*","matchCriteriaId":"E70C6D8D-C9C3-4D92-8DFC-71F59E068295"},{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*","matchCriteriaId":"691FA41B-C2CE-413F-ABB1-0B22CB322807"},{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*","matchCriteriaId":"09E6085C-A61E-4A89-BF80-EDD9A7DF1E47"},{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*","matchCriteriaId":"D835D592-2423-44C6-804A-3AD010112E7C"},{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*","matchCriteriaId":"568E2561-A068-46A2-B331-BBA91FC96F0C"},{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*","matchCriteriaId":"B578E383-0D77-4AC7-9C81-3F0B8C18E033"},{"vulnerable":true,"criteria":"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*","matchCriteriaId":"B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2"}]}]}],"references":[{"url":"https://source.android.com/security/bulletin/2018-05-01","source":"security@android.com","tags":["Patch","Vendor Advisory"]}]}}]}