cve/2015/CVE-2015-1538.md

41 lines
1.9 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2015-1538](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1538)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Integer overflow in the SampleTable::setSampleToChunkParams function in SampleTable.cpp in libstagefright in Android before 5.1.1 LMY48I allows remote attackers to execute arbitrary code via crafted atoms in MP4 data that trigger an unchecked multiplication, aka internal bug 20139950, a related issue to CVE-2015-4496.
### POC
#### Reference
- http://packetstormsecurity.com/files/134131/Libstagefright-Integer-Overflow-Check-Bypass.html
- https://groups.google.com/forum/message/raw?msg=android-security-updates/Ugvu3fi6RQM/yzJvoTVrIQAJ
- https://www.exploit-db.com/exploits/38124/
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/GhostTroops/TOP
- https://github.com/JERRY123S/all-poc
- https://github.com/Tharana/Android-vulnerability-exploitation
- https://github.com/Tharana/vulnerability-exploitation
- https://github.com/brimstone/stars
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/froweedRU/2015_1538
- https://github.com/hktalent/TOP
- https://github.com/jbmihoub/all-poc
- https://github.com/jduck/cve-2015-1538-1
- https://github.com/ksparakis/Stagefright-Explained
- https://github.com/mrash/afl-cve
- https://github.com/niranjanshr13/Stagefright-cve-2015-1538-1
- https://github.com/oguzhantopgul/cve-2015-1538-1
- https://github.com/renjithsasidharan/cve-2015-1538-1
- https://github.com/tanc7/Research-Operations
- https://github.com/tykoth/MrRobotARG
- https://github.com/weeka10/-hktalent-TOP