CVE-2017-13320

6.5 MEDIUM

📋 TL;DR

CVE-2017-13320 is an out-of-bounds read vulnerability in the libmpeg2dec library's impeg2d_bit_stream_flush() function. This allows remote attackers to cause denial of service through memory corruption when processing malicious MPEG-2 video files. The vulnerability primarily affects Android devices using vulnerable versions of the library.

💻 Affected Systems

Products:
  • Android
  • Devices using libmpeg2dec library
Versions: Android versions prior to May 2018 security patch level
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with MPEG-2 video processing capabilities using the vulnerable libmpeg2dec library.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote denial of service causing device instability, crashes, or reboot when processing malicious MPEG-2 content.

🟠

Likely Case

Application crashes or instability when processing malformed MPEG-2 video files, potentially affecting media playback functionality.

🟢

If Mitigated

Limited impact with proper input validation and memory protection mechanisms in place.

🌐 Internet-Facing: MEDIUM - Requires user interaction to open malicious content, but could be delivered via web or email.
🏢 Internal Only: LOW - Requires specific media file processing, not typically exposed to internal threats.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction to open malicious MPEG-2 file. No privilege escalation demonstrated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Android security patch level 2018-05-01 or later

Vendor Advisory: https://source.android.com/docs/security/bulletin/pixel/2018-05-01

Restart Required: Yes

Instructions:

1. Apply Android security patch level 2018-05-01 or later. 2. Update affected devices through standard Android update channels. 3. Reboot device after update installation.

🔧 Temporary Workarounds

Disable MPEG-2 processing

android

Block or disable MPEG-2 video file processing in affected applications

Input validation

all

Implement strict input validation for media files before processing

🧯 If You Can't Patch

  • Restrict processing of untrusted MPEG-2 video files
  • Implement application sandboxing to limit impact of potential crashes

🔍 How to Verify

Check if Vulnerable:

Check Android security patch level in Settings > About phone > Android security patch level

Check Version:

adb shell getprop ro.build.version.security_patch

Verify Fix Applied:

Verify security patch level is 2018-05-01 or later

📡 Detection & Monitoring

Log Indicators:

  • Application crashes related to media processing
  • SIGSEGV or memory access violation logs

Network Indicators:

  • Unusual MPEG-2 file downloads
  • Media file processing failures

SIEM Query:

source="android_logs" AND ("segmentation fault" OR "SIGSEGV" OR "libmpeg2dec")

🔗 References

📤 Share & Export