CVE-2017-13317

5.7 MEDIUM

📋 TL;DR

CVE-2017-13317 is an out-of-bounds read vulnerability in Android's HEIF image decoder that could allow remote attackers to read sensitive memory information. This affects Android devices processing malicious HEIF images, requiring user interaction to open such images. The vulnerability enables information disclosure without requiring additional privileges.

💻 Affected Systems

Products:
  • Android
Versions: Android 8.0 and 8.1
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects the HeifDecoderImpl component in Android's media framework. Pixel devices were specifically mentioned in the bulletin.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker could read sensitive memory contents from the device, potentially exposing cryptographic keys, authentication tokens, or other protected data.

🟠

Likely Case

Information disclosure of limited memory contents when user opens a malicious HEIF image, potentially revealing application data or system information.

🟢

If Mitigated

No impact if patched or if users avoid opening untrusted HEIF images from unknown sources.

🌐 Internet-Facing: MEDIUM - Requires user interaction to open malicious HEIF image from web/email, but common attack vector.
🏢 Internal Only: LOW - Requires user interaction with malicious file, less likely in controlled internal environments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction (opening malicious HEIF image) and specific memory layout conditions for successful exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android security patch level 2018-05-01 or later

Vendor Advisory: https://source.android.com/security/bulletin/pixel/2018-05-01

Restart Required: Yes

Instructions:

1. Apply Android security update with patch level 2018-05-01 or later. 2. For Pixel devices, install the May 2018 security update. 3. For other Android devices, check with manufacturer for available updates. 4. Reboot device after update installation.

🔧 Temporary Workarounds

Disable HEIF image processing

android

Prevent HEIF image decoding by disabling or removing HEIF support

Not applicable - requires system-level configuration changes

User education

all

Instruct users to avoid opening HEIF images from untrusted sources

🧯 If You Can't Patch

  • Implement application whitelisting to prevent untrusted applications from processing HEIF images
  • Use network filtering to block HEIF image downloads from untrusted sources

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android security patch level. If earlier than 2018-05-01, device is vulnerable.

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify Android security patch level shows 2018-05-01 or later date.

📡 Detection & Monitoring

Log Indicators:

  • Media server crashes
  • HEIF decoder errors in system logs
  • Unexpected memory access violations

Network Indicators:

  • HEIF image downloads from suspicious sources
  • Multiple failed HEIF parsing attempts

SIEM Query:

source="android_system" AND ("heif" OR "HeifDecoderImpl") AND ("crash" OR "exception" OR "out of bounds")

🔗 References

📤 Share & Export