Логотип exploitDog
bind:CVE-2015-3827
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2015-3827

Количество 4

Количество 4

ubuntu логотип

CVE-2015-3827

больше 10 лет назад

The MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in Android before 5.1.1 LMY48I does not validate the relationship between chunk sizes and skip sizes, which allows remote attackers to execute arbitrary code or cause a denial of service (integer underflow and memory corruption) via crafted MPEG-4 covr atoms, aka internal bug 20923261.

CVSS2: 9.3
EPSS: Средний
nvd логотип

CVE-2015-3827

больше 10 лет назад

The MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in Android before 5.1.1 LMY48I does not validate the relationship between chunk sizes and skip sizes, which allows remote attackers to execute arbitrary code or cause a denial of service (integer underflow and memory corruption) via crafted MPEG-4 covr atoms, aka internal bug 20923261.

CVSS2: 9.3
EPSS: Средний
github логотип

GHSA-7fgg-vfmh-488w

больше 3 лет назад

The MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in Android before 5.1.1 LMY48I does not validate the relationship between chunk sizes and skip sizes, which allows remote attackers to execute arbitrary code or cause a denial of service (integer underflow and memory corruption) via crafted MPEG-4 covr atoms, aka internal bug 20923261.

EPSS: Средний
fstec логотип

BDU:2015-11569

больше 10 лет назад

Уязвимость операционной системы Android, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

CVSS2: 9.3
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2015-3827

The MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in Android before 5.1.1 LMY48I does not validate the relationship between chunk sizes and skip sizes, which allows remote attackers to execute arbitrary code or cause a denial of service (integer underflow and memory corruption) via crafted MPEG-4 covr atoms, aka internal bug 20923261.

CVSS2: 9.3
12%
Средний
больше 10 лет назад
nvd логотип
CVE-2015-3827

The MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in Android before 5.1.1 LMY48I does not validate the relationship between chunk sizes and skip sizes, which allows remote attackers to execute arbitrary code or cause a denial of service (integer underflow and memory corruption) via crafted MPEG-4 covr atoms, aka internal bug 20923261.

CVSS2: 9.3
12%
Средний
больше 10 лет назад
github логотип
GHSA-7fgg-vfmh-488w

The MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in Android before 5.1.1 LMY48I does not validate the relationship between chunk sizes and skip sizes, which allows remote attackers to execute arbitrary code or cause a denial of service (integer underflow and memory corruption) via crafted MPEG-4 covr atoms, aka internal bug 20923261.

12%
Средний
больше 3 лет назад
fstec логотип
BDU:2015-11569

Уязвимость операционной системы Android, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

CVSS2: 9.3
12%
Средний
больше 10 лет назад

Уязвимостей на страницу