Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-1538

Опубликовано: 01 окт. 2015
Источник: ubuntu
Приоритет: negligible
CVSS2: 10

Описание

Integer overflow in the SampleTable::setSampleToChunkParams function in SampleTable.cpp in libstagefright in Android before 5.1.1 LMY48I allows remote attackers to execute arbitrary code via crafted atoms in MP4 data that trigger an unchecked multiplication, aka internal bug 20139950, a related issue to CVE-2015-4496.

РелизСтатусПримечание
devel

ignored

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored]
precise

DNE

trusty

ignored

trusty/esm

DNE

trusty was ignored
upstream

pending

vivid

ignored

vivid/stable-phone-overlay

ignored

vivid/ubuntu-core

DNE

wily

ignored

Показывать по

РелизСтатусПримечание
devel

not-affected

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was not-affected]
precise

DNE

trusty

not-affected

trusty/esm

DNE

trusty was not-affected
upstream

not-affected

vivid

not-affected

vivid/stable-phone-overlay

not-affected

vivid/ubuntu-core

DNE

wily

not-affected

Показывать по

10 Critical

CVSS2

Связанные уязвимости

nvd
больше 10 лет назад

Integer overflow in the SampleTable::setSampleToChunkParams function in SampleTable.cpp in libstagefright in Android before 5.1.1 LMY48I allows remote attackers to execute arbitrary code via crafted atoms in MP4 data that trigger an unchecked multiplication, aka internal bug 20139950, a related issue to CVE-2015-4496.

github
больше 3 лет назад

Integer overflow in the SampleTable::setSampleToChunkParams function in SampleTable.cpp in libstagefright in Android before 5.1.1 LMY48I allows remote attackers to execute arbitrary code via crafted atoms in MP4 data that trigger an unchecked multiplication, aka internal bug 20139950, a related issue to CVE-2015-4496.

fstec
больше 10 лет назад

Уязвимость операционной системы Android, позволяющая нарушителю выполнить произвольный код

10 Critical

CVSS2