Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-3827

Опубликовано: 01 окт. 2015
Источник: ubuntu
Приоритет: negligible
EPSS Средний
CVSS2: 9.3

Описание

The MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in Android before 5.1.1 LMY48I does not validate the relationship between chunk sizes and skip sizes, which allows remote attackers to execute arbitrary code or cause a denial of service (integer underflow and memory corruption) via crafted MPEG-4 covr atoms, aka internal bug 20923261.

РелизСтатусПримечание
devel

ignored

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored]
precise

DNE

trusty

ignored

trusty/esm

DNE

trusty was ignored
upstream

pending

vivid

ignored

vivid/stable-phone-overlay

ignored

vivid/ubuntu-core

DNE

wily

ignored

Показывать по

EPSS

Процентиль: 94%
0.12431
Средний

9.3 Critical

CVSS2

Связанные уязвимости

nvd
больше 10 лет назад

The MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in Android before 5.1.1 LMY48I does not validate the relationship between chunk sizes and skip sizes, which allows remote attackers to execute arbitrary code or cause a denial of service (integer underflow and memory corruption) via crafted MPEG-4 covr atoms, aka internal bug 20923261.

github
больше 3 лет назад

The MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in Android before 5.1.1 LMY48I does not validate the relationship between chunk sizes and skip sizes, which allows remote attackers to execute arbitrary code or cause a denial of service (integer underflow and memory corruption) via crafted MPEG-4 covr atoms, aka internal bug 20923261.

fstec
больше 10 лет назад

Уязвимость операционной системы Android, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

EPSS

Процентиль: 94%
0.12431
Средний

9.3 Critical

CVSS2