Vulnerability Details : CVE-2015-6602
libutils in Android through 5.1.1 LMY48M allows remote attackers to execute arbitrary code via crafted metadata in a (1) MP3 or (2) MP4 file, as demonstrated by an attack against use of libutils by libstagefright in Android 5.x.
Published
2015-10-02 02:59:05
Updated
2016-12-08 03:12:30
Vulnerability category: Input validationExecute code
Products affected by CVE-2015-6602
- cpe:2.3:o:google:android:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-6602
0.86%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 80 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-6602
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2015-6602
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-6602
-
https://support.silentcircle.com/customer/en/portal/articles/2145864-privatos-1-1-12-release-notes
HappyFox - The page you are looking for doesn't exist (404)
-
https://blog.zimperium.com/zimperium-zlabs-is-raising-the-volume-new-vulnerability-processing-mp3mp4-media/
New Vulnerability Processing MP3/MP4 Media | Zimperium zLabs
-
https://threatpost.com/stagefright-2-0-vulnerabilities-affect-1-billion-android-devices/114863/
Android Stagefright 2.0 Vulnerabilities | Threatpost
-
http://www.securitytracker.com/id/1033725
Google Android File Processing Flaws in libutils and libstagefright Lets Remote Users Execute Arbitrary Code - SecurityTracker
Jump to