Integer overflow in the SampleTable::setSampleToChunkParams function in SampleTable.cpp in libstagefright in Android before 5.1.1 LMY48I allows remote attackers to execute arbitrary code via crafted atoms in MP4 data that trigger an unchecked multiplication, aka internal bug 20139950, a related issue to CVE-2015-4496.
References
Configurations
History
21 Nov 2024, 02:25
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/134131/Libstagefright-Integer-Overflow-Check-Bypass.html - | |
References | () http://www.huawei.com/en/psirt/security-advisories/hw-448928 - | |
References | () http://www.securityfocus.com/bid/76052 - | |
References | () http://www.securitytracker.com/id/1033094 - | |
References | () http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-448928.htm - | |
References | () https://android.googlesource.com/platform/frameworks/av/+/2434839bbd168469f80dd9a22f1328bc81046398 - Vendor Advisory | |
References | () https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ - Vendor Advisory | |
References | () https://www.exploit-db.com/exploits/38124/ - |
Information
Published : 2015-10-01 00:59
Updated : 2024-11-21 02:25
NVD link : CVE-2015-1538
Mitre link : CVE-2015-1538
CVE.ORG link : CVE-2015-1538
JSON object : View
Products Affected
- android
CWE
CWE-189
Numeric Errors