Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9662-qxrh-f9g6

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Integer overflow in the SampleTable::setSampleToChunkParams function in SampleTable.cpp in libstagefright in Android before 5.1.1 LMY48I allows remote attackers to execute arbitrary code via crafted atoms in MP4 data that trigger an unchecked multiplication, aka internal bug 20139950, a related issue to CVE-2015-4496.

Integer overflow in the SampleTable::setSampleToChunkParams function in SampleTable.cpp in libstagefright in Android before 5.1.1 LMY48I allows remote attackers to execute arbitrary code via crafted atoms in MP4 data that trigger an unchecked multiplication, aka internal bug 20139950, a related issue to CVE-2015-4496.

EPSS

Процентиль: 99%
0.86405
Высокий

Связанные уязвимости

ubuntu
больше 10 лет назад

Integer overflow in the SampleTable::setSampleToChunkParams function in SampleTable.cpp in libstagefright in Android before 5.1.1 LMY48I allows remote attackers to execute arbitrary code via crafted atoms in MP4 data that trigger an unchecked multiplication, aka internal bug 20139950, a related issue to CVE-2015-4496.

nvd
больше 10 лет назад

Integer overflow in the SampleTable::setSampleToChunkParams function in SampleTable.cpp in libstagefright in Android before 5.1.1 LMY48I allows remote attackers to execute arbitrary code via crafted atoms in MP4 data that trigger an unchecked multiplication, aka internal bug 20139950, a related issue to CVE-2015-4496.

fstec
больше 10 лет назад

Уязвимость операционной системы Android, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 99%
0.86405
Высокий