Vulnerability Details : CVE-2015-3829
Off-by-one error in the MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in Android before 5.1.1 LMY48I allows remote attackers to execute arbitrary code or cause a denial of service (integer overflow and memory corruption) via crafted MPEG-4 covr atoms with a size equal to SIZE_MAX, aka internal bug 20923261.
Published
2015-10-01 00:59:14
Updated
2017-09-21 01:29:09
Vulnerability category: OverflowMemory CorruptionExecute codeDenial of service
Products affected by CVE-2015-3829
- cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-3829
26.67%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 97 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-3829
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2015-3829
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-3829
-
http://www.huawei.com/en/psirt/security-advisories/hw-448928
Security Advisory - Stagefright Vulnerability in Multiple Huawei Android Products
-
https://android.googlesource.com/platform/frameworks/av/+/2674a7218eaa3c87f2ee26d26da5b9170e10f859
2674a7218eaa3c87f2ee26d26da5b9170e10f859 - platform/frameworks/av - Git at GoogleVendor Advisory
-
http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-448928.htm
Security Advisory - Stagefright Vulnerability in Multiple Huawei Android Products
-
http://www.securityfocus.com/bid/76052
Google Stagefright Media Playback Engine Multiple Remote Code Execution Vulnerabilities
-
http://www.securitytracker.com/id/1033094
Google Android MMS Media Processing Flaw Lets Remote Users Execute Arbitrary Code on the Target System - SecurityTracker
-
https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ
Vendor Advisory
Jump to