cve/2015/CVE-2015-3864.md

28 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2015-3864](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3864)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Integer underflow in the MPEG4Extractor::parseChunk function in MPEG4Extractor.cpp in libstagefright in mediaserver in Android before 5.1.1 LMY48M allows remote attackers to execute arbitrary code via crafted MPEG-4 data, aka internal bug 23034759. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-3824.
### POC
#### Reference
- https://www.exploit-db.com/exploits/38226/
- https://www.exploit-db.com/exploits/39640/
- https://www.exploit-db.com/exploits/40436/
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Bhathiya404/Exploiting-Stagefright-Vulnerability-CVE-2015-3864
2024-08-30 20:52:42 +00:00
- https://github.com/Cmadhushanka/CVE-2015-3864-Exploitation
2024-05-26 14:27:05 +02:00
- https://github.com/HenryVHuang/CVE-2015-3864
- https://github.com/HighW4y2H3ll/libstagefrightExploit
- https://github.com/eudemonics/scaredycat
- https://github.com/hac425xxx/heap-exploitation-in-real-world
- https://github.com/hoangcuongflp/MobileSecurity2016-recap
- https://github.com/pwnaccelerator/stagefright-cve-2015-3864