Integer underflow in the MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in mediaserver in Android before 5.1.1 LMY48M allows remote attackers to execute arbitrary code via crafted MPEG-4 data, aka internal bug 23034759. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-3824.
Weaknesses in this category are related to improper calculation or conversion of numbers.
Link | Tags |
---|---|
https://groups.google.com/forum/message/raw?msg=android-security-updates/1M7qbSvACjo/Y7jewiW1AwAJ | vendor advisory mailing list |
https://blog.zimperium.com/cve-2015-3864-metasploit-module-now-available-for-testing/ | third party advisory release notes |
https://android.googlesource.com/platform/frameworks/av/+/6fe85f7e15203e48df2cc3e8e1c4bc6ad49dc968 | vendor advisory |
https://www.exploit-db.com/exploits/38226/ | exploit |
http://www.securityfocus.com/bid/76682 | vdb entry |
https://blog.zimperium.com/reflecting-on-stagefright-patches/ | |
https://www.exploit-db.com/exploits/40436/ | exploit |
https://www.exploit-db.com/exploits/39640/ | exploit |