Vulnerability CVE-2015-1538


Published: 2015-09-30   Modified: 2015-10-01

Description:
Integer overflow in the SampleTable::setSampleToChunkParams function in SampleTable.cpp in libstagefright in Android before 5.1.1 LMY48I allows remote attackers to execute arbitrary code via crafted atoms in MP4 data that trigger an unchecked multiplication, aka internal bug 20139950, a related issue to CVE-2015-4496.

See advisories in our WLB2 database:
Topic
Author
Date
High
Android Stagefright Remote Code Execution
Joshua J. Drake
10.09.2015

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Google -> Android 

 References:
http://packetstormsecurity.com/files/134131/Libstagefright-Integer-Overflow-Check-Bypass.html
http://www.huawei.com/en/psirt/security-advisories/hw-448928
http://www.securityfocus.com/bid/76052
http://www.securitytracker.com/id/1033094
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-448928.htm
https://android.googlesource.com/platform/frameworks/av/+/2434839bbd168469f80dd9a22f1328bc81046398
https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ
https://www.exploit-db.com/exploits/38124/

Copyright 2024, cxsecurity.com

 

Back to Top