Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-3864

Опубликовано: 01 окт. 2015
Источник: ubuntu
Приоритет: negligible
EPSS Высокий
CVSS2: 10

Описание

Integer underflow in the MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in mediaserver in Android before 5.1.1 LMY48M allows remote attackers to execute arbitrary code via crafted MPEG-4 data, aka internal bug 23034759. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-3824.

РелизСтатусПримечание
devel

ignored

esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was ignored]
precise

DNE

trusty

ignored

trusty/esm

DNE

trusty was ignored
upstream

needs-triage

vivid

ignored

vivid/stable-phone-overlay

ignored

vivid/ubuntu-core

DNE

wily

ignored

Показывать по

EPSS

Процентиль: 99%
0.87033
Высокий

10 Critical

CVSS2

Связанные уязвимости

nvd
больше 10 лет назад

Integer underflow in the MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in mediaserver in Android before 5.1.1 LMY48M allows remote attackers to execute arbitrary code via crafted MPEG-4 data, aka internal bug 23034759. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-3824.

github
больше 3 лет назад

Integer underflow in the MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in mediaserver in Android before 5.1.1 LMY48M allows remote attackers to execute arbitrary code via crafted MPEG-4 data, aka internal bug 23034759. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-3824.

fstec
больше 10 лет назад

Уязвимость операционной системы Android, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 99%
0.87033
Высокий

10 Critical

CVSS2