CVE-2015-3827
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in Android before 5.1.1 LMY48I does not validate the relationship between chunk sizes and skip sizes, which allows remote attackers to execute arbitrary code or cause a denial of service (integer underflow and memory corruption) via crafted MPEG-4 covr atoms, aka internal bug 20923261.
La función MPEG4Extractor::parseChunk en MPEG4Extractor.cpp en libstagefright en Android en versiones anteriores a 5.1.1 LMY48I no valida la relación entre los tamaños de fragmento y los tamaños de salto, lo que permite a atacantes remotos ejecutar código arbitrario o provocar una denegación de servicio (desbordamiento de entero y corrupción de memoria) a través de atoms MPEG-4 covr, también conocida como error interno 20923261.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2015-05-12 CVE Reserved
- 2015-10-01 CVE Published
- 2024-06-07 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
- CWE-189: Numeric Errors
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://www.huawei.com/en/psirt/security-advisories/hw-448928 | X_refsource_confirm | |
http://www.securityfocus.com/bid/76052 | Vdb Entry | |
http://www.securitytracker.com/id/1033094 | Vdb Entry | |
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-448928.htm | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|