CVE-2015-1538
Google Android - 'Stagefright' Remote Code Execution
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Integer overflow in the SampleTable::setSampleToChunkParams function in SampleTable.cpp in libstagefright in Android before 5.1.1 LMY48I allows remote attackers to execute arbitrary code via crafted atoms in MP4 data that trigger an unchecked multiplication, aka internal bug 20139950, a related issue to CVE-2015-4496.
Desbordamiento de entero en la función SampleTable::setSampleToChunkParams en SampleTable.cpp en libstagefright en Android en versiones anteriores a 5.1.1 LMY48I, permite a atacantes remotos ejecutar código arbitrario a través de atoms manipulados en datos MP4 que desencadenan una multiplicación no comprobada, también conocida como error interno 20139950, un caso relacionado con CVE-2015-4496.
Libstagefright integer overflow checks can be bypassed with extended chunk lengths.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-02-06 CVE Reserved
- 2015-09-10 CVE Published
- 2024-08-06 CVE Updated
- 2024-08-06 First Exploit
- 2024-09-07 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-189: Numeric Errors
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
http://packetstormsecurity.com/files/134131/Libstagefright-Integer-Overflow-Check-Bypass.html | X_refsource_misc | |
http://www.huawei.com/en/psirt/security-advisories/hw-448928 | X_refsource_confirm | |
http://www.securityfocus.com/bid/76052 | Vdb Entry | |
http://www.securitytracker.com/id/1033094 | Vdb Entry | |
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-448928.htm | X_refsource_confirm |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/38124 | 2024-08-06 |
URL | Date | SRC |
---|